BioStar 1 8 Administrator Guide - EN PDF
BioStar 1 8 Administrator Guide - EN PDF
BioStar 1 8 Administrator Guide - EN PDF
BioStar 1.8
Administrator Guide
BioStar 1.8 Administrator Guide
Disclaimers................................................................................ vii
Copyright Notice ..................................................................... viii
01 About the BioStar System ..................................................... 9
1.1 Logical Configuration ....................................................................... 12
1.2 Access Control Features ................................................................... 14
1.2.1 User Authentication ............................................................................... 14
1.2.2 User Management ................................................................................. 16
1.2.3 Access Group Management ................................................................... 16
1.2.4 Device Management .............................................................................. 16
1.2.5 Door and Elevator (Lift) Management .................................................... 17
1.2.6 Zone Management ................................................................................ 17
1.2.7 Time and Attendance ............................................................................. 17
1.2.8 IP Camera and NVR Server Management ............................................... 17
Disclaimers
The information in this document is provided in connection with Suprema products. No license,
express or implied, by estoppels or otherwise, to any intellectual property rights is granted by this
document, except as provided in Supremas Terms and Conditions of Sale for such products.
Suprema assumes no liability whatsoever and Suprema disclaims any express or implied warranty,
relating to sale and/or use of Suprema products, including liability or warranties relating to fitness for a
particular purpose, merchantability, or infringement of any patent, copyright, or other intellectual
property right.
Suprema products are not intended for use in medical, lifesaving, or life sustaining applications or
other applications in which the failure of the Suprema product could create a situation where personal
injury or death may occur. Should Buyer purchase or use Suprema products for any such unintended or
unauthorized application, Buyer shall indemnify and hold Suprema and its officers, employees,
subsidiaries, affiliates, and distributors harmless against all claims, costs, damages, expenses, and
reasonable attorney fees arising out of, directly or indirectly, any claim of personal injury or death
associated with such unintended or unauthorized use, even if such claim alleges that Suprema was
negligent regarding the design or manufacture of the part.
Suprema reserves the right to make changes to specifications and product descriptions at any time
without notice to improve reliability, function, or design. Designers must not rely on the absence or
characteristics of any features or instructions marked "reserved" or "undefined." Supreme reserves
these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities
arising from future changes to them.
Please contact Suprema, local Suprema sales representatives or local distributors to obtain the latest
specifications before placing your order.
Copyright Notice
This document is copyrighted 2008-2013 by Suprema, Inc. All rights reserved. All other product
names, trademarks, or registered trademarks are property of their respective owners.
BioStar is Suprema's next-generation access control system, based on IP connectivity and biometric
security. Most system devices integrate fingerprint scanners and card readers for multiple levels of user
authentication. However, Suprema's biometric devices, installed at each door, work not only as card or
fingerprint scanners and card readers, but also as intelligent access controllers.
The licensed standard edition of BioStar is unlocked by a USB dongle. Without the dongle, BioStar
functions as a free, but limited-capability version. With the dongle, BioStar offers greater versatility and
additional features, as shown in the table below:
Maximum # of clients 32 2
IO board Yes No
BioEntry W : The BioEntry W includes all of the features of the BioEntry Plus
in a vandal-resistant, IP65-rated structure. BioEntry W is ideal for outdoor
installation, with exceptional durability in harsh environments. It features
extensive communication interfaces and PoE cabability.
Xpass Slim: The XPass Slim device is a slimmer version of the Xpass that
supports FeliCa and ISO 15693 cards. Its low profile allows it to be installed
in tight spaces and it features access control to floors when connected with
a LIFT I/O device via RS485 slave.
BioMini/BioMini Plus: The BioMini and BioMini Plus devices are fingerprint
scanners that can be used for convenient user enrollment. Installing the
device is simple: plug them into a USB connection on any computer that is
connected to the BioStar server and install a driver.
Secure I/O: The Secure I/O device provides a convenient way to increase the
security of externally mounted devices or expand the capabilities of your
system. When doors are controlled by a secure I/O device, intruders cannot
open doors even if they succeed in uninstalling external devices. To further
increase security, the secure I/O device provides encrypted communications
between door components. The Secure I/O device has four input switches
and two output relays to allow control of multiple components with a single
device.
LIFT I/O: The LIFT I/O supports 0-9 device IDs and 12 output ports (12 input
ports are not currently supported). Each output can be connected to an
elevator button to control access to floors. The LIFT I/O can be connected
via RS485 as a slave to Xpass and Xpass Slim devices. Up to 10 LIFT I/O
devices can be connected to an Xpass or Xpass Slim device to control up to
120 floors.
Overall, the system supports a maximum of 512 doors and 512 devices (20 doors and
devices in the free version). Networked devices can be easily grouped together to create
various combinations of anti-passback or alarm zones, as illustrated by the graphic that
follows.
User ID + card + fingerprint: a user ID, access card, and fingerprint scan are used in
combination.
Fingerprint only: authentication via a fingerprint scan is the only method to gain entry.
Card only: authentication via an access card is the only method to gain entry.
[D-Station Only]
Fingerprint + fingerprint: dual fingerprints are used in fusion.
Fingerprint + face detection: a fingerprint and face detection are used in fusion.
Fingerprint + fingerprint + face detection: dual fingerprints and face detection are
used in fusion.
[FaceStation Only]
Face: authentication via face recognition is the only method to gain entry.
Face + Password: authentication via face recognition plus password.
Face + Card: authentication via face recognition plus access card.
Face + Card or Password: authentication via face recognition plus access card or
password.
Face + Card + Password: authentication via face recognition plus card plus password.
User ID + Face: authentication via user ID plus face recognition.
User ID + Face or Password: authentication via user ID plus face regognition or
password.
User ID + Face + Password: authentication via user ID plus face recognition plus
password.
D-Station devices allow the system to store images of users and control access via face
detection, in addition to fingerprint, access card, and user ID authentication. D-Station, X-
Station, BioStation T2 and FaceStation devices are equipped with cameras to allow for face
detection and recording of face images for enhanced security. For more information about
face detection, see section 3.6.3.
events with real-time still images transferred from the IP cameras. By interoperating with the
NVR servers, the BioStar system can also display time-sorted event logs, together with
recorded videos stored on the servers. From the BioStar interface, administrators can add
and customize IP cameras and their functions. For more information about the IP cameras
and NVR servers, see sections 3.11 and 4.1.
02
Install the BioStar
Software
Installing BioStar is a fairly simplistic process, provided that you address a few prerequisites before
beginning the installation:
First, you must select a PC that can remain running constantly to function as the BioStar server. The
server will receive and store log data from connected devices in real time.
Second, you must choose a type of database to use. The BioStar server supports either MySQL or
MS SQL Server (including the scaled-down, free MS SQL Server Express). Regardless of which
database you choose, you must have sufficient access rights and privileges to connect to the
database and create new tables.
Third, ensure that the PCs you will use for both server and client applications meet the minimum
requirements listed in section 2.1.
The BioStar installation CD includes the BioStar installer. By default, the installer will install both the
server and client applications with minimal input (see section 2.2). However, you may choose to install
the server and client applications independently if you need to specify additional database options or
desire to install the applications on separate PCs (see sections 2.3 and 2.4).
Windows Vista
The minimum system requirements for installing and operating the BioStar software include
the following:
CPU: Intel Pentium or similar processor, capable of processing speeds of 1GHz or faster
RAM: 512MB
HDD: 5GB
2GHz or faster
RAM: 1GB for Windows XP; 2GB for other operating systems
HDD: 10GB
!
Attention: If you have installed a previous installation on the machine with BioStar
installer, remove the old version before runninng the BioStar Installer.
Before you run the BioStar installer, close all other open applications. If you have previously
installed BioAdmin on the same machine, ensure that you stop the BioAdmin server before
beginning the installation.
5. Make sure that both the Server and Client applications are selected in the Select
Features dialog box, then click Next to proceed.
!
Attention: If you have installed a previous installation on the machine with BioStar
installer, remove the old version before runninng the BioStar Installer.
5. At the Select Features dialog box, click the Client checkbox to uncheck it and exclude
the Biostar client application in the installation (both the server and slient applications
are checked by default), then click Next to proceed.
Note: The default name for the database is always BioStar, to prevent unintentional
installation of multiple databases on the same system or database server. The database
name can be changed by editing the DBSetup.exe file. When patching the database server,
you will have the option to manually select a datbase.
10. If you choose MS SQL Server, you must configure the authentication method as well
(MySQL allows only server authentication):
Server authentication: this option uses login IDs and passwords to authenticate
users that are created by and stored on the SQL Server. These credentials are not
based on Windows user accounts. Users connecting via server authentication must
provide their credentials every time that they connect.
Windows authentication: this option uses Windows users accounts for
authentication. When users connect through a Windows user account, the SQL
Server validates the account name and password using the Windows principal
token in the operating system. The SQL Server does not ask for a password and
does not independently validate user identification. Windows authentication is the
default authentication mode for MS SQL Server.
Note: You must choose the authentication mode that is supported by the database. You
must also provide the proper credentials to create new tables in the database.
On desktop, click BioStar Server Config to start BioStar Server setting program. Or, in
Windows, Start > All programs > BioStar 1.8 > Server Service > BioStar Server Config
The server configuration utility allows you to monitor and control the following:
Status: view and modify the current status of the BioStar server (Stopped or Started).
You can stop and start the server by clicking the Start or Stop button on the right.
Connection: view and modify the details for the connection between the server and
devices.
TCP Port: enter the port that devices and client applications use to connect to the
server. You should use a port that is not shared with any other software
applications. In most cases, you can use the default port (1480).
Thread Count: enter the maximum thread count that the BioStar server can create.
You can enter any number between 32 and 512; however, keep in mind a larger
thread count will consume more system resources.
Client List: click this button to view a list of devices that are connected to the
BioStar server. The list shows the IP address of each device and whether or not a
SSL certificate has been issued to the device. You can issue or remove SSL
certificates directly from the utility.
Database: view and modify database settings. For more information about how to alter
these settings, see the procedure for setting up the BioStar server in section 2.3.
Max Connection: specify the maximum number of connections between the server
and the database. In most cases, the default value (1) is appropriate.
SSL: view or modify the settings for OpenSSL. Click Browse to locate the path for the
OpenSSL application or click Change to change the pass phrase.
5. At the Select Features dialog box, click the Server checkbox to uncheck it and exclude
the Biostar server application in the installation (both the server and client applications
are checked by default), then click Next to proceed.
2. Click Server Setting. This will open the Connect Server dialog box.
6. Enter an Admin ID and password, confirm the password, and choose an administration
level from the drop-down level.
7. Click OK. This will return you to the Login dialog box.
8. Enter a User ID and password and click Login.
Each element is named as what is displayed in the title. For example, it is called User window,
Customize dialog box, Additional Infomation tab, Basic Information area.
5. Drag a command to the toolbar. This will add a new button for the command.
This section describes how to add administrator accounts, devices, doors, zones, departments, users,
and access groups and setup time and attendance within the BioStar software. This administrator's
guide does not cover procedures for installing physical components, wiring doors and devices, or
connecting devices to networks. For more information about hardware installation and physical
configuration of your access control system, please refer to the installation guides that accompany
your access control devices.
Administrators are capable of adding and configuring devices, users, doors, zones, and
access groups. They also can manage time and attendance functions, including setting up
time categories, daily schedules, shifts, holiday rules, and leave periods, as well as creating,
modifying, and viewing time and attendance reports. In addition, administrators can create
custom administrator levels that are granted various privileges for the BioStar system menus.
Operators can monitor and manage the BioStar system via a remote client terminal.
Operators have the same privileges with administrators, other than the privileges to create
and delete other administrator or operator accounts. Like administrators, operators are
capable of adding and configuring devices, users, doors, zones, and access groups. They also
can manage time and attendance functions, including setting up time categories, daily
schedules, shifts, holiday rules, and leave periods, as well as creating, modifying, and viewing
time and attendance reports.
Managers have privileges to read all information in the menus. However, they cannot create,
modify, or delete anything in the menus. Depending on your organizations requirements,
the capability to view events may be useful for other management purposes.
The custom administrator level can be assigned full or limited privileges on the seven
menus. On each menu, you can assign one of three privileges: All Rights, Modify, or Read.
Depending on your organizations requirements, the BioStar system can be managed more
effectively by adding custom administrator levels.
A typical setup will consist of one administrator (or more, depending on the size of your
organization) who has full access to the system. Below the administrator level, several
operators may perform various functions, such as remotely controlling doors and locks,
adding users, registering fingerprints, issuing access cards, adding access groups, defining
timezones, and configuring alarm events.
The custom administrator level can be assigned privileges for specific users and
devices. A custom administrator will have the privileges you assign (All Rights,
Modify, or Read) only for those users or devices that you specify and will not be
allowed to view or modify other users or devices. While you are creating a custom
administrator level, in the User menu, you can grant privileges for users in a
department and its sub departments. However, ensure that you do not select
individual users, but rather the first-level or second-level departments they belong
to.
In the Device menu, you can grant privileges for specific devices. If a device has a
slave device connected, the privileges for the host device will also apply to the slave
device. Users and devices that are not selected in the User and Device menus will
not appear in the Doors, Visual Map, Access Control, Monitoring, and Time and
Attendance menus. If a door or zone is associated with devices that are not granted
privileges, the door or zone will not appear in the Door menu.
older versions of BioStar. If you are using an older version of BioStar be sure to
install the correct USB drivers.
Virtual USB Device: choose this option to search for virtual devices that you have
added to a USB drive.
4. Click Next.
5. For USB or Virtual USB searches, skip to step 7. If you are searching for devices
connected via LAN or serial ports, set advanced search criteria:
LAN: Select whether to search for devices using TCP or UDP protocols. When you
select TCP, you can specify an IP address range, the type of device you are
searching for (BioStation/D-Station/X-Station/BioStation T2/FaceStation: 1470,
BioEntry Plus/BioEntry W/BioLite Net/
Xpass/Xpass Slim: 1471, or Custom: enter manually), and the port to search with.
If you select UDP, you can search for devices only in the same subnet.
Serial: Specify a COM port (or select All port) and a baud rate. You can connect up
to 31 devices per COM port via RS485. If the RS485 cable is too long, the signal
may be weakened. In this case, you should install a terminating resistance at both
ends of the bus by turning on the Dip Switch on your device for normal signal
transmission. On the other hand, if the cable is too short, the resistance may
interrupt signal transmission. Therefore, by considering the length of the cable
and the signal status, select whether to turn on or off the terminating resistance
switch.
6. Click Next.
7. When BioStar completes the search, you can specify network settings as described
below. Click a device name in the list on the left and then configure the settings as
required:
Note: If you change the network settings for a device at this point, the device will be
removed from the device list. To add the device in the following steps, you must search for
the device again.
You need not and should not add devices with server mode. The devices will connect to the
server by themselves, and will be listed under the BioStar Server on the Device Tree dialog
box. If you are trying to add devices with server mode, the process will fail.
DHCP or Static IP: If you choose to use the DHCP option, the device will
automatically acquire network settings from the DHCP server. If you do not use
DHCP, you must configure the network settings manually.
Direct connection: This is the default connection option. With this option, the
BioStar client will connect directly to the device. If you choose this type of
connection, the BioStar client must be running to retrieve the log records from the
device.
Server connection: If you choose this option, the device will automatically
connect to the BioStar server. If you configure the server IP address and port
correctly, log records from the device will be gathered at the server, regardless of
whether or not the BioStar client is online. This option may also be useful if your
network configuration requires you to connect devices with private IP addresses
(for example, over a WAN) to a server with a public IP address. This option also
provides SSL encryption for BioStation devices.
8. Click Next.
9. Select the device or devices to add by clicking the checkboxes next to the device IDs.
To add an RF device:
1. Connect the RF device to a Suprema device.
2. Ensure that the Suprema device is added to the BioStar system (see section 3.2.1).
6. Click Change Setting in the WLAN section. If you choose to use Preset #1 or
#2, the following figures will appear.
[Wireless LAN-supported BioStation models and D-Station]
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
Black List: Use this tab to block access through a particular card, e.g. a card which
has been stolen or used by a former employee. You can use this feature only when
the card mode of the device is set to 'Template on Card'. Adding a user ID or card
ID denies access from the users with the matching ID or card.
Command Card: Use this tab to issue command cards that can control BioEntry
Plus or BioEntry W devices. For more information about issuing command cards,
see section 3.2.6.1.
Display/Sound: Use this tab to configure LED & Buzzer settings according to the
event or status.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.133.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
Black List: Use this tab to block access through a particular card, e.g. a card which
has been stolen or used by a former employee. You can use this feature only when
the card mode of the device is set to 'Template on Card'. Adding a user ID or card
ID denies access from the users with the matching ID or card.
Display/Sound: Use this tab to configure LED & Buzzer according to the event or
status.
T&A: Use this tab to configure time and attendance settings.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.133.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others, select other devices
from the Device Tree dialog box, and click Apply.
Operation mode: Use this tab to set the device time or retrieve it from a host PC,
adjust settings for operation modes, and adjust settings for card ID formats. Xpass
Slime devices do not support the Mifare template cards.
Network: Use this tab to specify settings for LAN or serial connections.
Access Control: Use this tab to specify entrance limits and access groups.
Input: Use this tab to add or modify inputs to the device.
Output: Use this tab to add or modify outputs from the device.
Command Card: Use this tab to issue command cards that can control Xpass or
Xpass Slim devices. For more information about issuing command cards, see
section 3.2.8.1.
Display/Sound: Use this tab to configure LED & Buzzer according to the event or
status.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.133.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others, select other devices
from the Device Tree dialog box, and click Apply.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.133.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
Access Control: Use this tab to specify entrance limits and default access groups
for an individual device.
Input: Use this tab to add, modify, or delete input settings for the device.
Output: Use this tab to add, modify, or delete output settings for the device.
Black List: Use this tab to block access through a particular card, e.g. a card which
has been stolen or used by a former employee. You can use this feature only when
the card mode of the device is set to 'Template on Card'. Adding a user ID or card
ID denies access from the users with the matching ID or card.
Display/Sound: Use this tab to adjust display or sound settings and add
background images and sounds.
T&A: Use this tab to configure time and attendance settings.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.133.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
Display/Sound: Use this tab to adjust display or sound settings and add
background images and sounds.
T&A: Use this tab to configure time and attendance settings.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.133.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
Output: Use this tab to add, modify, or delete output settings for the device.
Display/Sound: Use this tab to adjust display or sound settings and add
background images and sounds.
T&A: Use this tab to configure time and attendance settings.
Wiegand: Use this tab to configure the Wiegand format. For more information
about Wiegand formats, see section 3.2.133.
4. When you are finished configuring the device, click Apply to save your changes.
5. To apply the same settings to other devices, click Apply to Others and select other
devices from the Device Tree dialog box.
4. Click Change Format. This will open the Wiegand Configuration wizard.
5. Click a radio button to select one of the following formats:
26-bit Standard: This format is the most widely used and consists of an 8-bit FC
code and a 16-bit ID. You cannot change the bit definition of the format or the
parity bits of this format.
Pass-through: Use this format to customize only the ID bits. During verification, if
the ID is recognized, the Wiegand input string will pass through in its original
form. You cannot set the parity bits or alternative values of this format. By
definition, the pass-through format is useful only when the operation mode is
one-to-one (1: 1). In one-to-many (1: N) mode, non-ID bits are set to 0.
Custom: With a custom format, you can define the ID bits, parity bits, and
alternative values.
6. Use the Wiegand Configuration wizard to customize the Wiegand format to your
specifications (see the subsections that follow for more information).
7. When you have completed making changes with the wizard, click Apply to save your
changes.
4. Click the User ID button (I) on the right and assign ID bits by clicking the
appropriate squares.
5. Click the Custom ID button on the right, and then click the square, and set the
area for custom ID bit.
6. Click the Even Parity button (E) on the right and assign an even parity bit by
clicking on the appropriate squares.
7. Click the Odd Parity button (O) on the right and assign an odd parity bit by
clicking on the appropriate squares.
8. Click Next.
9. In the Wiegand Configuration - Parity dialog box, select the bits that will be
used to calculate the first parity bit.
10. As necessary, click >> and select the bits that will be used to calculate
additional parity bits. You must perform this step for each parity bit you
assigned in steps 4 and 5. If necessary, you can click Initialize to reset the
selection.
11. Click Next.
12. In the Wiegand Configuration - Alternative Value dialog box, select a field
to customize (non-ID bits only).
13. Click the Alt Value checkbox and enter a new value for the output string.
14. Repeat steps 10-11 as necessary to customize the rest of the output string.
15. Click Finish to close the wizard.
4. Click OK.
3. Configure door information on the following tabs. For an explanation of door settings,
see section 5.2.
Details: Use this tab to control the interaction between doors, devices, locks, and
exit buttons. If you add two devices to a door, you can also use this tab to
configure anti-passback settings.
Alarm: Use this tab to specify what actions to take when the door is forced open
or held open.
Zone: Use this tab to see the zones associated with a door.
Access Control: Use this tab to see the access groups associated with a door.
Event: Use this tab to retrieve and monitor an event log for the door.
4. When you are finished configuring the device, click Apply to save your changes.
4. Click OK.
!
Attention: When using Xpass or Xpass Slim devices as lift readers, transferring settings
to the device with the User menu will reset all of the settings and user data stored on the
device. To preserve the settings, use the Transfer to Device function in the Lift menu
instead.
3. In the lift tree, select a device or devices by clicking the checkboxes next to device
names.
4. Click Apply to send the elevator settings to the selected devices.
Entrance limit zone: Use this zone to restrict the number of times a user can enter an
area. The entrance limit can be tied to a timezone, so that a user is restricted to a
maximum number of entries during a specified time span. You can also set time limits
for reentry to enforce a timed anti-passback restriction. For information about
customizing entrance limit zones, see section 5.3.2.
Alarm zone: Use this zone to group inputs from multiple devices into a single alarm
zone. Devices in the alarm zone can be simultaneously armed or disarmed via an arm or
disarm card or a key. For more information about configuring alarm zones, see sections
3.5.2.4, 3.5.2.5, 3.5.2.6 and 5.3.3.
Fire alarm zone: Use this zone to control how doors will respond during a fire. External
inputs can be fed into the BioStar system to automatically trigger door releases or
perform other actions. For more information about customizing fire alarm zones, see
section 5.3.4.
Muster zone: Use this zone to monitor and track employees during an emergency or to
perform a roll call where employees are required to be present in a particular area at a
particular time. Muster zone allows administrators to determine if any employee has not
reported to the muster area and, if any employee is unaccounted for, take the necessary
actions to locate them. For more information about customizing muster zone, see
section 5.3.6.
Interlock zone: Use this zone to create an interlock area with two doors equipped with
devices. When an external input indicates that one door is open, the other door is
automatically locked to provide a secure interlock area. A reader-equipped door that
does not belong to any other zone can be used to create up to four interlock zones
(four zones maximum per reader). For more information about configuring an interlock
zone, see section 5.3.7.
4. Select a device (or multiple devices) from the list and click >.
Anti-passback zones: When the Select Zone Attribute pop-up appears,
select an attribute from the drop-down list (In Device or Out Device).
Alarm zones: When the Select Zone Attribute/Type pop-up appears,
select a device attribute from the drop-down list (General, Arm, Disarm, or
Arm/Disarm). If you select an arm or disarm attribute (or Arm/Disarm),
click the Card or Key radio button to specify how to arm or disarm zones,
and then press OK. For more information about arming or disarming
zones, see section 3.5.2.5.
5. Press Save to add the devices to the list.
To configure inputs:
1. Click Doors in the shortcut pane.
2. In the navigation pane, click the name of a zone.
3. In the Zone tab, at the bottom of the Device List, click Add Input. This will
open the Add Zone Input dialog box.
Send Email: Create an email alert to send when an alarm is activated and
select recipients or email alerts. For more information about email alerts,
see section 3.10.2.
Output Device: Specify a device that will send an alarm signal to an external
device, such as an alarm siren.
Output Port: Specify the port to use for an output signal.
Output Signal: Specify a type of output signal.
When adding users, you will first need to create a user account. Once the account has been
created, you can register fingerprints and access cards or edit user details as desired.
4. Register fingerprints (see section 3.6.2), face images (see section 3.6.3), and access
cards (see section 3.6.4) as necessary.
5. When you are finished adding details to the users account, click Apply.
To register fingerprints:
1. Click User in the shortcut pane.
2. In the navigation pane, click a users name.
3. Click the Fingerprints tab in the User pane.
4. Select the device you will use for scanning fingerprints from the Enroll Device
drop-down list.
5. Select a security level from the 1: 1 Security Level drop-down list.
6. Specify any of the following options, as desifred:
Enroll Quality: Set the quality of fingerprints to be enrolled to increase
authentification efficiency. The quality of a fingerprint is determined by
multiple factors incluing data on its minutiae distribution. You can specify
four values (20, 40, 60, 80) and selecting the higher numbers will improve
the quality of a fingerprint but can reduce the chances of a fingerprint
being enrolled. Please note that this option is only avaiable on BioStar
Standard Edition.
Show Fingerprint Image: Specify whether to display a fingerprint image
on the screen. Fingerprint images are not saved in the database of BioStar
server and you can only save individual images on your PC if necessary.
7. Click Add at the bottom right of the User pane to create an empty slot for
registering a fingerprint.
8. In an empty finger slot, press Scan and then have the user place his or her
finger on the scanner twice, as prompted by the BioStar interface.
9. If desired, click the checkbox next to the Duress option to set this fingerprint
as the duress signal.
10. Repeat steps 6-8 to register the rest of fingerprints.
11. Click Apply to save your changes.
12. Validate the submitted fingerprints by clicking either one or both of the
following two options:
Verification Test: Compare a newly-scanned fingerprint to only the
stored fingerprint templated collected from a prior enrollment.
4. Select the Enrollment Device you will use for capturing face images from the drop-
down list.
5. Click Add at the bottom right of the screen to add face(from the 1st Face to the 5th
Face).
Note: FaceStation supports up to 5 different user faces to ensure the most accurate face
detection at all times, regardless of the different hair styles, make-ups or eye glasses the user
might wear.
6. Click the newly added face, click Capture, then follow the instructions prompted by the
enrollment device. Repeat steps 5~6 to add more faces.
7. Click Use Profile Img to use the currently registered and selected face image as the
users profile image in the User pane.
8. Click Apply to save your changes.
4. Select the enrollment device you will use for capturing face images from the drop-
down list.
5. In the 1st Face section, click Capture, and then have the user align his or her face with
the camera, as prompted by the device.
6. If desired, click Use Profile Img to use the image assigned to the users profile instead
of capturing a new image.
7. Repeat steps 5-7 in the 2nd Face and 3rd Face sections to capture additional face
images.
8. Click Apply to save your changes.
EM4100 and HID cards require only a card ID to complete card registration, while MIFARE
and iCLASS cards support two operation modes: Card Serial Number (CSN) and Template-
on-Card modes. FeliCa cards support only the CSN mode. When using the CSN mode, you
can read the serial number just as you would for an EM4100 or HID card. When using
Template-on-Card mode, you must record the user information, including fingerprint
templates, directly to the card.
Follow the procedures below to issue the appropriate type of card and then add it to the
user's account.
6. Select a device or Smart Card Reader from the Device ID drop-down list.
7. Enter a card ID and custom ID either manually or by reading from the card
(you can also click Use User ID to insert the users ID in these fields):
To enter the data manually, type the card ID and custom ID in the
corresponding fields, click OK, and then skip to step 8.
To read the data from the card, click Read Card (the LED on the device you
selected will begin flashing) and then place the card on the device. After
the card has been read, click OK.
8. Click Apply to save the card to the user's account.
6. Select a Device ID or USB MIFARE device (if connected) from the drop-down
list.
7. If desired, click Bypass Card to allow the user to bypass the fingerprint
authentication.
8. Click Read Card. The LED on the device that you selected will begin flashing.
9. Place the card on the device.
10. After the card is read, click OK.
11. Click Apply to issue the card to the user's account.
Note: iCLASS 2000, 2002 and 2004 cards are not supported as template cards.
Note: This feature is only supported for template-on-cards. Also, please note that
site keys must be carefully guarded. If the site key is revealed, your security system
can be bypassed.
The last block of each sector (blocks 3, 7, 11, and so on) is reserved for site
key information.
The card information sector (CIS) occupies three contiguous blocks and
should start at the first available block of a sector (blocks 4, 8, 12, and so
on).
There should be no overlap between each templates data.
2. Use the drop-down lists and input fields to configure the following
parameters of the MIFARE layout:
CIS Index Block: Select the block index to use for header information (4,
8, 12, or 16).
Number of Templates: Select the number of templates to include in the
layout (0 to 4).
Template Size: Select the number of bytes to use in the template. The
default size is 334 bytes.
Template 1-4 Start Block: Enter the starting block for each fingerprint
template.
3. To use the custom layout, click Apply to Devices and select the appropriate
device numbers from the Device Tree dialog box.
4. To save your changes, click Save.
Note: To reset any changes you have made, click Default. To exit the dialog box
without saving changes, click Close.
BioEntry Plus iCLASS devices support 16k bit (2k Byte) and 32k bit (4k Byte) iCLASS
cards. The 16k bit (2k Byte) cards are available with either 2 or 16 application areas
and are organized into 237 blocks of 8 bytes each. The 32k bit (4k Byte) cards are
available with either 2 or 16 application areas, plus an additional 16k user
configurable memory, and are organized into 8 pages with 26 blocks of 8 bytes
each.
3. Select a device or devices from the list on the left by clicking the checkboxes
next to device names.
4. Click a user name (you can hold down the Ctrl key while selecting multiple
users).
5. If desired, click the checkbox to overwrite users with different information.
6. Click Transfer to Device to send the user information to the selected devices.
Note: You can also delete users from devices with this menu. This action cannot be
undone, so use this feature with caution. To delete users from a device, click a
users name and then click Delete Users.
When using Xpass or Xpass Slim devices as lift readers, transferring settings to the
device with the User menu will reset all of the settings and user data stored on the
device. To preserve the settings, use the Transfer to Device function in the Lift menu
instead.
3. Click a device name in the list on the left to display user templates contained
in the device.
4. Click a user in the Template Information list (new users will be highlighted in
yellow).
5. Click Get From Device.
Note: You can also delete users from devices with this menu. This action cannot be
undone, so use this feature with caution. To delete users from a device, click a
users name and then click Delete (or click Delete All to delete all user records at
once).
!
Caution: If there are the same users on the BioStar database when you retrieve
user data from Xpass devices, the data will be overwritten without fingerprint
data because Xpass devices do not store fingerprint data.
4. Click the device name in the device list on the left and display user information in the
device.
5. With color information, compare user data between the device and server and select
users.
6. Click Get from Device.
Note You can use Personal Information Encryption without encryption keys. Any
combination of letters, numbers and special characters up to 32 characters can be used as
the encryption key.
5. Click Change to close the window then click Save to save changes.
5. If desired, you can add up to two holiday schedules to the timezone. To create holiday
schedules, see section 3.7.2.
6. When you are finished creating the timezone, click Apply.
7. Next, transfer the timezone data to devices:
8. In the task pane, click Transfer to Device. This will open the Device Tree dialog box.
9. Select a device or devices by clicking the checkboxes in the Device Tree dialog box.
10. Click OK.
You can now combine the timezone with door permissions to create an access group (see
section 3.8).
5. If the holiday recurs every year, click the checkbox below the drop-down list.
6. Set the duration of the holiday (in days).
7. Click Add to add the holiday to the list.
8. Click Apply.
5. Select doors to add to the group by clicking the checkboxes next to door groups or
individual doors.
6. Select a timezone to apply to the group from the drop-down list at the bottom of the
dialog box.
7. Repeat steps 5 and 6 as necessary to add multiple sets of doors and timezones to the
access group.
8. Click OK to add your selections to the group.
4. Click OK.
If you have setup user groups, users will appear under their respective groups.
4. Click Add. This will open the User Access Group dialog box.
5. Click the name of an access group from the list on the left and then click >.
6. Repeat step 5 as needed to assign additional access groups.
7. When you are finished assigning access groups, click OK.
- Minimum Duration: Set the minimum duration for the time slot (in minutes).
Workers must be checked in for at least the minimum duration, or the system
will record no time worked for the time slot.
- Grace (Start): Activate and set a grace period for checking in late at the
beginning of the time slot (in minutes). Click the checkbox to enable the grace
period and then specify the length of the grace period in the corresponding
field. Workers who check in within the grace period will be considered to have
checked in right at the start of the time slot.
- Grace (End): Activate and set a grace period for checking out early at the end
of the time slot (in minutes). Click the checkbox to enable the grace period and
then specify the length of the grace period in the corresponding field. Workers
who check out within the grace period will be considered to checked out right
at the end of the time slot.
- Rounding (In): Specify in minutes how to round a users check-in time (for
example, a entry of 5 will round a users time to the nearest 5-minute
decrement).
- Rounding (Out): Specify in minutes how to round a users check-out time (for
example, an entry of 5 will round a users time to the nearest 5-minute
decrement).
- Auto Check IN: Enable or disable this feature to automatically check-in a user
who has failed to check-in for the time slot.
- Auto Check OUT: Enable or disable this feature to automatically check-out a
user who has failed to check-out for the time slot.
- Affect Result: Allow or disallow data from this time slot to be used to
determine overall time and attendance result per one daily schedule.
c. Click Add to add the time slot to the daily schedule.
6. Click Apply to save the daily schedule.
3. Click one of the radio buttons to set the shift as a part of a daily or weekly cycle. If you
select weekly, a calendar week will constitute a cycle. If you select daily, you can
specify any number of consecutive days (e.g., 5, 10, or 20 days) to constitute a cycle.
Note: Daily cycle is available only with the Standard Edition of BioStar.
6. Click the ellipsis button (...) to select a daily schedule. This will open the T&A Tree
dialog box. See section 3.9.2 to define the daily schedules that will appear in this dialog
box.
7. Select a daily schedule and click OK to apply the daily schedule to the shift.
8. Repeat steps 5-7 as needed.
Note: You can copy a schedule from one day to the next by clicking the arrow to the right
of the day. In addition, you can add up to 1,024 daily schedules to the list.
4. Click the radio button next to Shift Management and then click Add at the bottom of
the User pane. This will open the T&A Tree dialog box.
To assign multiple users to a shift via the Time and Attendance pane:
1. Click Time and Attendance in the shortcut pane.
2. In the navigation pane, click a shift name.
3. In the Shift pane, click the User tab and then click Add at the bottom of the pane. This
will open the Add New User dialog box.
Select and deselect with >, >> or <, <<, and check selected devices and unselected devices through
the panel. Manual Add can be made through direct device ID and name input when a device is no
longer able to be found from the server but used before.
the system to receive inputs from external devices (such as fire warning devices) or send
outputs to external devices (such as alarm sirens).
2. Select a priority level from the drop-down list and click Add. This will open a
list of events.
3. Select the events to include in the priority level and click OK.
4. Select an action or actions by clicking the checkboxes on the right.
Program Sound: Choose a sound from the drop-down list and then
specify the duration (play count) of the sound in seconds. If you set the
Play Count to 0, the specified sound will play until someone with
administrative privileges manually stops the sound via the Realtime
Monitoring tab in the Monitoring pane. To add custom sounds to the list,
please see section 3.10.1.2.
Send Email: Click the ellipsis button () to the right to select an email
recipient. To configure email notifications, please see section 3.10.2.
Acknowledge: Activate pop-up alerts on client PCs.
Color: Specify the color of text and background on any event raised by
priority in the Alert Window.
5. Repeat steps 2-4 as desired to customize other priority levels.
6. When you are finished, click Save.
2. Click Add.
3. Locate a waveform (.wav) file on your computer or network and click Open.
4. If desired, click a sound and then click Play to hear the sound.
5. When you are finished, click Save.
2. Type the email address, SMTP server, port number, SMTP ID, and SMTP password in the
Sender Info section, then choose one of the options(NO SECURITY, TLS or SSL) in the
Security Type drop-down list.
3. Type the email address in the Recipient Info section.
4. Click Add to add the configuration to the list.
5. Repeat steps 2-4 as necessary to add other email configurations.
6. When you are finished, click Save.
E-mail setting
Using Alarm setting, you can send an e-mail with user-customized format.
1. Click Option > Event > Alarm Setting > Send Email > The button, then the Select
Admin & Contents window will open.
2. Click the Setup button and the Email Setting window will open.
3. Fill in Sender Info and click the Add button.
4. Click the Add button.
5. Click the Contents button and you can modify the e-mail contents settings.
To configure outputs:
1. Click Device in the shortcut pane.
2. In the navigation pane, click a device name.
3. In the Device pane, click the Output tab.
4. Click Add at the bottom of the pane. This will open the Output Setting dialog
box.
5. Configure actions that will activate (send a signal to) a specified output relay:
a. In the Alarm On Event section, select an event from the first drop-down
list.
b. Select the device number or All Device from the second drop-down list.
c. Select a signal setting from the third drop-down list.
d. Enter a priority for the event. Only an event with an equal or higher
priority (1 is the highest) can override a previous event. For example, an
alarm on (activate) event with a priority of 2 can be canceled only by an
alarm off (deactivate) event with a priority of 1 or 2.
e. Click Add.
6. Configure actions that will turn off (stop sending a signal to) an activated
output relay:
a. In the Alarm Off Event section, select an event from the first drop-down
list.
b. Select the device number or All Device from the second drop-down list.
c. Enter a priority for the event.
d. Click Add.
7. When you are finished, click Save.
To configure inputs:
3. In the Task pane, click Add New Camera Server. This will open a Camera (Setup Mode)
pane similar to the one below.
4. In the Basic Information section, enter a name, type, model, IP address, and port
number for the NVR server, and then enter the BioStar user name and password
required to access the NVR server.
5. Click Detect to view cameras that are currently connected to the NVR server.
6. Click Apply at the bottom right of the Camera (Setup Mode) pane. This will add the
detected cameras under the NVR server in the navigation pane, as illustrated below.
7. In the navigation pane, click a camera name. This will open the Camera (Setup Mode)
pane.
8. Click Add at the bottom right of the Device List to open the Device Tree dialog box.
4. In the Basic Information section, enter a name, type, model, IP address, and port
number for the IP camera and enter a user name and password for the BioStar to acess
the IP camera.
5. In the Details tab, click Add at the bottom right of the Device List section to open the
Device Tree dialog box.
Once you have properly set up the BioStar system, management is fairly simple. BioStar allows you to
monitor events in real-time and view event logs by date, control parts of the system remotely, manage
users, and upgrade device firmware directly from the BioStar interface. In addition, you can activate
fingerprint encryption, if necessary, to provide an additional level of security and privacy.
This tab shows all events that have occurred since you last logged into the system. The
tab shows the current monitoring status (Monitoring Started or Monitoring Paused) and
includes buttons for starting (play) or stopping (pause) real-time monitoring. The sound
bar icon on the right shows whether an alarm sound is currently playing (green bars) or
not (grey bars). To stop an alarm sound, click the sound bars icon.
BioStar displays the following camera icons at the front of the event logs:
Icon Description
The event log includes a still image. Click the event log to view the
image.
The event log includes a video. Double-click the event log to view the
video.
When both camera icons are displayed, single-click the icon to view the still image and
double-click the icon to view the recorded video. When you double-click the video icon, a
video playback window will appear that is similar to the one below.
Coupled with the face detection features of D-Station, X-Station, BioStation T2, or
FaceStation, administrators can verify users identity by clicking Show Image (to view the
users stored face image) and Auto Image Reflect (to view the most recent face image
captured by the local device). Clicking Show Image also opens a window at the bottom
where the user image will be displayed. Click Real Size to view the full-sized (640 x 480)
stored image, instead of a thumbnail version and click Show Popup to open the image in a
new window that can be repositioned on the screen.
To see a users photos upon successful authentication events, click Option > Event > Profile
Image Setting in the menu bar, select event types, and then click the checkbox next to
Show Image Profile. The users image will appear on the realtime monitoring tab when he or
she successfully completes one of the authentication events specified in the Profile Image
Setting dialog box.
As of BioStar V1.3, administrators can monitor users locations and authentication status via
a Roll Call (muster) feature. This feature allows administrators to determine whether users
are present, missing, or have gained entry to areas for which they are not authorized.
To save the report data as a comma delimited file, click Save as CSV. To print the report,
click the printer icon. To export the report, click the export icon.
5. If desired, specify a particular admin or user by clicking the checkbox next to the Admin
ID, Admin IP, or User ID fields, and then entering the appropriate identification.
6. Click Get Log. This will generate a list of the relevant events for the period you
specified.
5. At the bottom of the Visual Map window, click Set Background to add a floor plan.
The BioStar supports images larger than resolution 730x470 in jpg, bmp, gif, or png
format only.
6. Choose an image and click Open.
7. Click Add Door to add doors. This will open a window with a list of doors.
8. From the door list, click the checkboxes next to doors to add and click Apply. Door
icons will appear on the floor plan.
9. Click and drag the door icon to the desired location on the floor plan. You can
individually relocate a door icon or name by double-clicking the door icon or name.
10. To remove a door from the floor plan, click the door and then click Remove Door.
11. Repeat steps 7-10 as necessary to add additional doors.
12. When you are finished adding doors, click Apply.
Note: To remove all doors from the plan and start over, click Reset.
To monitor doors:
1. In the task pane, click Monitor Visual Map. Monitor Mode will appear in the title bar
of the Visual Map window.
2. Monitor door status and activities on the visual map, as represented by the following
icons. Door activities, such as successful authentication or alarms will appear on the
door icons:
Icon Activity
Door is open
Note: Door icons will change only when door sensors have been assigned in the door
settigns and detect the door status. In other words, door icons change only when the door
actually opens or closes and not when you click Open Door or Close door. For more
information about door settings, see section 5.2.1.
3. To open or close a door, click a door and then click Open Door or Close Door. To
change settings for a door, click a door and then click Setup Door.
4. The current relay status can be checked through Visual Map in Monitoring.
5. Show Event Tooltip for Selected Door option is added to indicate the details of the
current door status.
6. Event or door name font size can be enlarged or reduced by selecting font size in
Setup Visual Map and Monitor Visual.
To release alarms:
1. Click Monitoring in the shortcut pane.
2. The Door/Zone Monitoring tab lists doors names and alarm events. To release (cancel)
an alarm, click the door name and then click Release Alarm.
1. From the menu bar, click Option > Device > Unlock All Devices.
2. If necessary, enter a password in the Enter Locking Password dialog box and
click OK (if you have not created a locking password, simply click OK). See
section 4.4.3.2 to create a locking password.
2. Click the first checkbox to lock all devices when exiting BioStar.
3. If desired, click the second checkbox to change the lock password:
a. Enter the old password
b. Enter the new password
c. Retype the new password to confirm.
2. Click the Initialize Password checkbox to activate the buttons at the bottom of
the screen.
3. Click Get Challenge Code. This will open the Get Challenge Code dialog box.
4. Select the appropriate device from the drop-down list and click Get.
5. Click Save as File to save the challenge code to your computer.
6. Email the challenge code to Suprema ([email protected]). Supremas
technical support personnel will return an unlocking code to you via email.
7. When you receive the code from Suprema, open the Auto Locking dialog box
and activate the buttons (see steps 1-2).
8. Click Unlock Device and Password to Default. This will open the Write
Challenge Code dialog box.
9. Click Open Code File and locate the file sent to you by Suprema.
10. When you have opened the file, click Write. This will unlock the device and
reset the locking password to the default (no password).
To delete a user:
1. Click User in the shortcut pane.
2. Right-click a user's name.
3. Click Delete User.
4. Click OK to confirm the deletion.
To delete users directly from a BioEntry Plus or BioEntry W device via command
cards:
1. Place a delete card (command card) on a BioEntry Plus or BioEntry W device.
2. If authorization is required, an administrator must scan his or her fingerprints
to continue.
3. Place the user's access card on the device and then have the user place his or
her finger on the scanner (as prompted by the device).
To delete users directly from an Xpass or Xpass Slim device via command cards:
1. Place a delete card (command card) on an Xpass or Xpass Slim device.
2. If authorization is required, an administrator must place his or her access card
on the device to continue.
3. Place the user's access card on the device.
4. Place the delete card on the device again to confirm the action.
To delete all users directly from a BioEntry Plus or BioEntry W device via command
cards:
1. Place a delete all card (command card) on a BioEntry Plus or BioEntry W
device.
2. If authorization is required, an administrator must scan his or her fingerprints
to continue.
3. Place the delete all card on the device again to confirm the action.
To delete all users directly from an Xpass or Xpass Slim device via command cards:
1. Place a delete all card (command card) on an Xpass or Xpass Slim device.
2. If authorization is required, an administrator must place his or her access card
on the device to continue.
3. Place the delete all card on the device again to confirm the action.
To create a department:
1. Click User in the shortcut pane.
2. In the navigation pane, right-click User.
3. Click Add Department.
4. Enter a name for the department.
To transfer users to a department, simply click and drag a user name onto a department
name.
2. Select an order number from the first drop-down list (choose a number that is
not already in use).
3. Select a field type from the second drop-down list. To restrict the field to
numerical values, click the Only Digit checkbox.
4. Enter item data (for example, items to appear in a combo box) and a name for
the item.
5. Click Add.
6. Repeat steps 2-5 as desired to create additional information fields.
7. When you are finished, click Save.
3. Select types of user data to export by clicking items in the list on the left and then
clicking >.
4. Optional: Click Show Column Name below the selected filed list to include a fields
column name with its data in an exported file.
5. After selecting all the types of user data to export, click Next.
6. Type a path and filename for the user data or click Browse to select a location to save
the file.
7. Click Next.
8. Click Export to begin exporting the user data.
9. When the export is complete, click Finish.
3. Type a path and filename where the user data is located or click Browse to select a file.
4. Click Next. The raw data types will be displayed and the User list field will default to
Not use. Click here to change.
5. Click the cell to the right of a data sample. This will open the Setup Field dialog box,
which allows you to map the raw data to a user information field in BioStar.
6. Map the data to a field by selecting a field label from the drop-down list and then click
OK.
Note: Up to four department levels can be displayed in BioStar. In the CSV file, include
department levels in the same cell, separated by slashes (for example, Department
1/Department 2/Department 3), and then map the cell to the Department field in BioStar.
3. Click User, a user name, or a department name in the pane on the left. This will display
the corresponding T&A status in the pane on the right.
4. To close the dialog box, click Close.
2. In the task pane, click Report. This will open the T&A Report dialog box.
You can sort report data by clicking any column header (the sort will toggle between
ascending and descending orders). You can also rearrange the columns by dragging and
dropping column headers in a new location. Furthermore, you can add or remove columns
by using the menu that appears when you right-click on any column header:
2. Select a period unit which regular work hours are based on, and enter the amount of
regular work corresponding to the period. The work hours that have exceeded the
regular time would be considered overtime work and reported.
3. Click OK.
Note: To successfully display overtime hours in a report, you should set the start day
of the periold to Sunday of the week that you want to check for.
3. To edit an event, change the following event properties as necessary and then click
Edit Event. To add an event, change the following event properties as necessary and
then click Add Event. To delete the event, click Delete Event.
Date: Select whether the event occurred on this day or the next day.
Event: Select the type of event.
Time: Set the time of the event.
Device: Set the device where the event occurred.
4. When you are finished modifying the event data, click the X in the top right corner to
close the dialog box.
5. In the T&A Report window, ensure that the Rebuild checkbox is NOT checked.
6. Click Update Report. The report will show the changes you have made. The changes
you have made via the detailed editing will not be restored to the original data even if
you click the check box next to Rebuild and click Update Report. If you want to
reproduce the report with the original data, click the checkboxes next to Rebuild and
Rebuild All and then click Update Report.
Note: You can sort report data by clicking any column header (the sort will toggle between
ascending and descending orders). You can also rearrange the columns by dragging and
dropping column headers in a new location.
1. Generate a T&A report as described in 4.5.2 and make any necessary modifications as
described in 4.5.3.
2. Click View Report. This will open a preview window similar to the one below.
2. Click the radio button next to the type of device you want to upgrade.
3. Click Select Device and select a device or devices from the Device Tree dialog box.
4. Click OK to close the Device Tree dialog box.
5. Click Select Firmware.
6. Locate the firmware file on your computer or network and click Open.
7. Click Upgrade.
8. When the firmware upgrade is complete, wait for the device to restart, and then click
Close.
2. Click the checkbox under Security Option to activate the fingerprint template
encryption.
Customize Settings
This section describes the settings available in the BioStar software. BioStar provides precise control
and customization of the access control system via settings for device functions, door and zone
behaviors, and user accounts.
BioStation Time
Date: Manually set the device date with a drop-down calendar.
Time: Manually set the device time.
Sync with Host PC Time: Check this box to get the time of the lcoal
PC which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option
and you can set the devices time to match this time by clicking Set
Time.
Get Time: Get the current time displayed by the device.
Set Time: Set the time on the device.
1: 1 Operation Mode: the drop-down lists in this area allow you to control
the authentication mode by schedule. For example, you can choose a normal
authentication mode for working hours and a more strict authentication mode
for hours outside the normal schedule. You can specify authentication modes
either by device or by user (see section 5.4.1). Unless a particular mode is
specified for a user, the device authentication mode will apply.
ID/Card + Fingerprint: Set the device to require ID or card plus
fingerprint authorization (Always, Disable, or custom schedule).
ID/Card + Password: Set the device to require ID or card plus
password authorization (Always, Disable, or custom schedule).
ID/Card + Fingerprint/Password: Set the device to require ID or card
plus fingerprint or password authorization (Always, Disable, or custom
schedule).
Card Only: Set the device to require only card authorization (Always,
Disable, or custom schedule).
ID/Card + Fingerprint + Password: Set the device to require ID or
card plus fingerprint plus password authorization (Always, Disable, or
custom schedule).
Mifare (available only on BioStation Mifare devices)
Not use Mifare: Check this box to disable MIFARE card authorization.
Use Template on Card: Check this box to use the template on the
MIFARE card for authorization.
View Mifare Layout: Click this button to view the MIFARE layout used
by the device. For more information about configuring MIFARE
layouts, please see section 3.6.4.7.
Card ID Format
Format Type: Set the type of pre-processing to occur on card ID data
(Normal or Wiegand). If Normal is selected, the card ID data will be
processed in its original form. If Wiegand is selected, devices will
interpret card ID data according to the Wiegand format settings.
Byte Order: Specify whether to swap ID card data between cards and
devices by most significant byte (MSB) or least significant byte (LSB).
Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
Other options
1: N Schedule: Set a schedule for using fingerprint only
authentication (Always, Disable, or custom schedule).
1: N Operation Mode: Set a method for activating the fingerprint
sensor (Auto, Ok/Function Key, or None).
Private Auth: Set the device to allow a private authorization method
(Disable or Enable). If enabled, the authentication mode of the user will
be determined by a users Authorization setting, which is located on
the Details tab. If disabled, the authentication mode will be
determined by operation mode settings of the device.
Double Mode: Set the device to require authentication of two users
access cards or fingerprints (Always, Disable, or custom schedule). The
timeout for presenting the second authentication is 15 seconds.
Fast ID Matching: Set the device to allow quicker authentication, by
requiring users to input only the first two digits of the user ID and
scan a single fingerprint (Enable or Disable). This option attempts
authentication for a smaller subset of users (only those with the same
first two digits in their user IDs) to increase matching speed.
Note: This option does not support server matching (see 5.1.1.2). When
using function keys for T&A events (see 5.1.1.8), only keys F1-F4 are
supported (BioStation V1.7 and higher).
- Use Wiegand Card Bypass: By Wiegand setting in BioStar, this feature exports
CSN regardless of whether the authentication is successful or not. This is
designed to be used as a dummy reader that doesnt have a door control
feature. When a card data input is made, the device sends out the data through
Wiegand without going through a matching process.
Note:This feature is supported from the FW versions, BioStation 1.93, BioStation
T2 1.3, FaceStation 1.3,
BioEntry Plus 1.6, BioEntry W 1.2, BioLite Net 1.4, Xpass 1.3.
Fingerprint
Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
Image Quality: Set the strictness of the quality check for fingerprint
scans (Weak, Normal, or Strict). If a fingerprint image is below the
specified quality level, it will be rejected.
TCP/IP Setting
LAN Type: Select a type of LAN connection from the drop-down list
(Disable, Ethernet, or Wireless LAN).
Port: Specify a port to use for the device.
WLAN: Select a preset WLAN configuration from the drop-down list.
This option is active only when WLAN is selected as the TCP/IP setting.
Change setting: Click to specify settings for a wireless local area
network (WLAN). This option is active only when WLAN is selected as
the TCP/IP setting. For more information about configuring settings
for a WLAN, please see section 3.2.4.
Use DHCP: Click this radio button to enable the dynamic host
configuration protocol (DHCP) for the device.
Not Use DHCP: Click this radio button to disable the dynamic host
configuration protocol (DHCP) for this device.
IP Address: Specify an IP address for the device.
Subnet: Specify a subnet address for the device.
Gateway: Specify a network gateway.
Max Conn.: Specify the maximum number of connections to allow.
Server
Use: Click this radio button to enable the server mode.
Not use: Click this radio button to disable server settings.
IP Address: Specify an IP address for the BioStar server.
Server Port: Specify the port used to connect to the server.
SSL: Displays the status of SSL for the server connection.
Time sync with Server: Check this box to synchronize the device time
with the server. The device polls for a time change on the server every
one hour and its time will be synchronized with the server when the
devices time and the servers time differ by more than 5 seconds.
RS485
Mode: Set the mode for a device connected via RS485 (Disable, Host,
Slave, or PC Connection). For more information about RS485 modes,
see sections 3.2.1 and 3.2.2.
Baudrate: Set the baud rate for a device connected via RS485 (9600 to
115200).
RS232: Set the baud rate for a device connected via RS232 (9600 to 115200).
USB Setting: Click the radio buttons to enable or disable the USB port on
the BioStation device.
Device: Select the BioStation (or Secure I/O) device for which you will add or
modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the radio buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
Not Use: The input port will not be monitored.
Generic Input: The input port will be monitored for a triggering
action (For the events specified with Detect Input 0-3 in the Output
Setting dialog box, please see section 5.1.1.6).
Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a Close Door command via the Door/Zone
Monitoring tab (see section 4.4.1).
Release All Alarms: Cancel alarms associated with this device.
Restart Device: Restart the device.
Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process fingerprints or card
inputs. To enable communication again, an administrator must enter
the master password for a BioStation device or provide authentication
locally for a BioEntry Plus or BioEntry W device.
With BioStar 1.8v, LED Green Input, LED Red Input, Buzzer Input, Access
Granted Input, and Access Denied Input were newly added. And these input
options are available only with BioStation (FW 1.93v), BioStation T2 (FW 1.3v),
FaceStation (FW 1.3v), BioEntry Plus (FW 1.6v), BioEntry W (FW 1.2v), BioLite
Net (FW 1.4v), and Xpass (FW 1.3v).
Schedule: Set the schedule during which the inputs will be monitored
(Always, Disable, or custom schedule).
Duration (ms): Set the duration (in milliseconds) an input signal must last to
trigger the specified action.
Device Type: Select the device type for which you will add or modify
settings.
Port: Select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port
Setting).
Priority: set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
Event: Select an event that will deactivate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, a priority 2 alarm on event (activate) can be overridden
only by an alarm off (deactivate) event with a priority of 1 or 2.
Current Count: The total number of user IDs and access cards that have
been registered.
Reserved: The remaining number of user IDs and access cards that can be
registered.
Display/Sound
Language: Set the language to use on the display (Korean, English, or
Custom).
Sub Info: Set the info to display at the bottom of the BioStation
display (Time, or None).
Menu Timeout: Set the length of time before the display will return to
the idle screen (Infinite, 10 sec, 20 sec, or 30 sec).
Private Msg: Enable or disable the option to show a private message
on the BioStation display (Disable or Enable). You can add a private
message from the Event tab in the User pane: click Modify Private
Information, set options for display count and display duration, enter
text in the Private Message field, and then click Save.
Resource: Set the language resource file to use for the BioStar
interface (No Change, English, Korean, or Custom). To use a language
resource file other than English or Korean, select Custom and then
click the ellipsis () button to locate the resource file.
Background: Set the type of background for the BioStation display
(Logo, Notice, or Slide Show). Supported file types (JPG, GIF, BMP, and
PNG) cannot exceed 320x240 pixels each. Only one image at a time
can be used as a logo or notice, while up to 16 images can be
displayed (at a set interval) in a slide show.
Notice: Click this button to create a notice that will be shown on the
BioStation display. After creating a notice, you can click Apply to apply
Function Key: Select a function key from the drop-down list to assign
a T&A event (F1-F4, 1-9, CALL, 0, or ESC). If you are using the Event Fix
mode, you can click the checkbox to the right to designate a fixed
event.
Event Caption: Enter a caption for the event.
Auto Mode Schedule: When using the Auto Change mode, you can
specify when the event will occur by selecting a timezone in the drop-
down list. For more information on creating a timezone, please see
section 3.7.1.
Event Type: Set the type of event to assign to the key (Not Use, Check
In, Check Out, In, or Out). In/Out indicates the general check in/out
events during a day whereas Check In/Out indicates the formal check
in/out events upon arrival and departure at workor the first checkin
and the last checkout events on that day. When you choose Check In
or Check Out, you can enable the Regard as normal check-in/check-
out event option. If this option is enabled, users who activate the
appropriate keys will be regarded as arriving or leaving on time at
work even though they actually arrive late or leave early. If you enable
the Only Result option, they appear being on time on T&A reports
but their work time will be calculated correctly based on their actual
check in/out time. If you choose Out, you can enable the Add work
time after this event option. If this option is enabled, users activating
the appropriate key will be considered working for the remainder of
the time slot even if they leave the office early.
Wiegand Mode: Set the mode of Wiegand input to use when reading card
ID data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of previous
versions of BioStar). The Extended mode will allow RF card readers to
operate independently, which allows them to be associated with doors,
included in zones, and leave logs with their own device IDs.
Wiegand Input: Assign the Wiegand input:
Disabled: The input will not be used.
Wiegand [Card]: The ID field of the Wiegand string is interpreted as a
card ID.
Wiegand [User]: The ID field of the Wiegand string is interpreted as a
user ID.
Wiegand Output: Assign the Wiegand output:
Disabled: The output will not be used.
Wiegand [Card]: Inserts the card ID of the authenticated user in the
ID field of the Wiegand string.
Wiegand [User]: Inserts the user ID of the authenticated user in the
ID field of the Wiegand string.
Card ID Format
Format Type: Set the type of pre-processing to occur on card ID data
(Normal or Wiegand). If Normal is selected, the card ID data will be
processed in its original form. If Wiegand is selected, devices will
interpret card ID data according to the Wiegand format settings.
Byte Order: Specify whether to swap ID card data between cards and
devices by most significant byte (MSB) or least significant byte (LSB).
Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
Fingerprint
Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
Scan Timeout: Set the length of time before the fingerprint scanner
will timeout (1 sec to 20 sec). If a user does not place a finger on the
device within the timeout period, the authorization will fail.
Server Matching: Enable this setting to perform fingerprint or card ID
matching at the BioStar server, instead of the device. When this mode
is enabled, the devices will send the fingerprint template or card ID to
the server to verify a match. This mode is useful when you have more
users than can be downloaded to a device or user information cannot
be distributed due to security concerns.
1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal, Fast,
or Fastest). Setting Fast Mode to Auto will adjust the matching speed
according to the number of enrolled templates.
Matching Timeout: Set the length of time before the device will
timeout when trying to identify a fingerprint match (0 [Infinite] to 10
sec).
Check Fake Finger: Set the device to detect the use of fake
fingerprints, such as those made from silicon or rubber, and prevent
unauthorized access.
TCP/IP
Use DHCP: Click this radio button to enable the dynamic host
configuration protocol (DHCP) for the device.
Not Use DHCP: Click this radio button to disable the dynamic host
configuration protocol (DHCP) for this device.
IP Address: Specify an IP address for the device.
Subnet: Specify a subnet address for the device.
Gateway: Specify a network gateway.
Port: Specify a port to use for the device.
Server
Use: Click this radio button to use specific server settings.
Not use: Click this radio button to disable server settings.
IP Address: Specify an IP address for the BioStar server.
Time sync with Server: Check this box to synchronize the device time
with the server. The device polls for a time change on the server every
one hour and its time will be synchronized with the server when the
devices time and the servers time differ by more than 5 seconds.
Support 100 Base-T: This option allows you to enable or disable a fast
Ethernet connection for the device. When enabled, the device will detect
the Ethernet network and automatically establish the best connection. If
you do not enable this option, the device will attempt to establish a
10Base-T Ethernet connection.
Use: Click this radio button to enable the 100base-T connection for
the device.
Not Use: Click this radio button to disable the 100base-T connection
for the device.
RS485
Mode: Set the mode for a device connected via RS485 (Disable, Host,
Slave, or PC Connection).
Baudrate: Set the baud rate for a device connected via RS485 (9600 to
115200).
Support MTU Size setting
Devices affiliated with Black Fin support MTU Size setting. The supported
packet size is between 1078 and 1514, and the default is 1514.
Note: This feature is supported from the FW versions, BioEntry Plus 1.6,
BioEntry W 1.2, BioLite Net 1.4, Xpass 1.3.
T&A Mode: Set the time and attendance mode for the device
(Disable, Fixed In, Fixed Out, and Auto).
Fixed Entrance: When the Auto T&A mode is selected, specify when
to allow entrance events by selecting a timezone (Always, Disable, or
custom timezone) in the drop-down list. For more information on
creating a timezone, pleas see section 3.7.1.
Fixed Exit Time: When the Auto T&A mode is selected, specify when
to allow exit events by selecting a timezone (Always, Disable, or
custom timezone) in the drop-down list. For more information on
creating a timezone, please see section 3.7.1.
In Event Caption: Set a caption for check-in.
Out Event Caption: Set a caption for check-out.
Device: Select the BioEntry Plus or BioEntry W (or Secure I/O) device for
which you will add or modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the radio buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
Not Use: The input port will not be monitored.
Generic Input: The input port will be monitored for a triggering
action (events specified with Detect Input 1-3 in the Output setting
dialog box see section 5.1.2.6).
Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
Device Type: Select the device type for which you will add or modify
settings.
Port: Select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port
Setting).
Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
Event: Select an event that will deactivate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on event (activate) can be overridden only by an
alarm off (deactivate) event with a priority of 1 or 2.
Current Count: The total number of user IDs and access cards that have
been registered.
Reserved: The remaining number of user IDs and access cards that can be
registered.
Card ID: Enter the card ID or click Read Card and place a command card on
the reader to automatically populate the fields.
Command Type: Select a type of command card to issue (Enroll Card, Delete
Card, or Delete All Card).
Event: Specify the affected event by selecting it from the drop-down list.
LED: Set the LED behavior for a specified event.
Count: Enter a number of LED cycles for the specified event. Enter 0
to enable an infinite loop or -1 to disable the LED.
Colors: Specify up to three display colors from the drop-down list. The
LED will cycle through these colors in order, from top to bottom. Next
to each color, enter the duration (in milliseconds) that the LED should
display the selected color and the duration (in milliseconds) that the
LED should remain off before advancing to the next color in the cycle.
Buzzer: Set the buzzer behavior for a specified event.
Count: Enter a number of buzzer cycles for the specified event. Enter
0 to enable an infinite loop or -1 to disable the buzzer.
Volume: Set up to three tone volumes from the drop-down list (Low,
Middle, or High). The buzzer will cycle through these volumes in order,
from top to bottom. Next to each volume, enter the duration (in
milliseconds) that the buzzer should maintain the selected volume and
the duration (in milliseconds) that the buzzer should remain off before
advancing to the next volume in the cycle.
Fade Out: Set the tone volume to fade out before advancing to the
next volume in the cycle by clicking this checkbox.
Wiegand Mode: Set the mode of Wiegand input to use when reading card
ID data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of previous
versions of BioStar). The Extended mode will allow RF card readers to
operate independently, which allows them to be associated with doors,
included in zones, and leave logs with their own device IDs.
Wiegand Input: Assign the Wiegand input:
Disabled: The input will not be used.
Wiegand [Card]: The ID field of the Wiegand string is interpreted as a
card ID.
Wiegand [User]: The ID field of the Wiegand string is interpreted as a
user ID.
Wiegand Output: Assign the Wiegand output:
Disabled: The output will not be used.
Wiegand [Card]: Inserts the card ID of the authenticated user in the
ID field of the Wiegand string.
Wiegand [User]: Inserts the user ID of the authenticated user in the
ID field of the Wiegand string.
BioLiteNet Time
Date: Manually set the device date with a drop-down calendar.
Fingerprint
Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
Scan Timeout: Set the length of time before the fingerprint scanner
will timeout (1 sec to 20 sec). If a user does not place a finger on the
device within the timeout period, the authorization will fail.
Server Matching: Enable this setting to perform fingerprint or card ID
matching at the BioStar server, instead of the device. When this mode
is enabled, the devices will send the fingerprint template or card ID to
the server to verify a match. This mode is useful when you have more
users than can be downloaded to a device or user information cannot
be distributed due to security concerns.
1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal, Fast,
or Fastest). Setting Fast Mode to Auto will adjust the matching speed
according to the number of enrolled templates.
Matching Timeout: Set the length of time before the device will
timeout when trying to identify a fingerprint match (0 [Infinite] to 10
sec).
Check Fake Finger: Set the device to detect the use of fake
fingerprints, such as those made from silicon or rubber, and prevent
unauthorized access.
you do not enable this option, the device will attempt to establish a
10Base-T Ethernet connection.
Use: Click this radio button to enable the 100base-T connection for
the device.
Not Use: Click this radio button to disable the 100base-T connection
for the device.
RS485
Mode: Set the mode for a device connected via RS485 (Disable, Host,
Slave, or PC Connection).
Baudrate: Set the baud rate for a device connected via RS485 (9600 to
115200).
Device: Select the BioLite Net (or Secure I/O) device for which you will add
or modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the radio buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
Not Use: The input port will not be monitored.
Generic Input: The input port will be monitored for a triggering action
(For the events specified with Detect Input 1-3 in the Output setting
dialog box, please see section 5.1.3.6).
Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a Close Door command via the Door/Zone
Monitoring tab (see section 4.4.1).
Release All Alarms: Cancel alarms associated with this device.
Restart Device: Restart the device.
Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process fingerprints or card
inputs. To enable communication again, an administrator must enter
the master password for a BioStation device or provide authentication
locally for a BioLite Net device.
With BioStar 1.8v, LED Green Input, LED Red Input, Buzzer Input,
Access Granted Input, and Access Denied Input were newly added.
And these input options are available only with BioStation (FW 1.93v),
BioStation T2 (FW 1.3v), FaceStation (FW 1.3v), BioEntry Plus (FW 1.6v),
BioEntry W (FW 1.2v), BioLite Net (FW 1.4v), and Xpass (FW 1.3v).
Schedule: Set the schedule for the input actions (Always, Disable, or custom
schedule).
Duration (ms): Set the duration (in milliseconds) an input signal must last to
trigger the specified action.
Device Type: Select the device type for which you will add or modify
settings.
Port: Select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Current Count: The total number of user IDs and access cards that have
been registered.
Reserved : The remaining number of user IDs and access cards that can be
registered.
Event: Specify the affected event by selecting it from the drop-down list.
LED: Set the LED behavior for a specified event.
Count: Enter a number of LED cycles for the specified event. Enter 0
to enable an infinite loop or -1 to disable the LED.
Colors: Specify up to three display colors from the drop-down list. The
LED will cycle through these colors in order, from top to bottom. Next
to each color, enter the duration (in milliseconds) that the LED should
display the selected color and the duration (in milliseconds) that the
LED should remain off before advancing to the next color in the cycle.
Buzzer: Set the buzzer behavior for a specified event.
Count: Enter a number of buzzer cycles for the specified event. Enter
0 to enable an infinite loop or -1 to disable the buzzer.
Volume: Set up to three tone volumes from the drop-down list (Low,
Middle, or High). The buzzer will cycle through these volumes in order,
from top to bottom. Next to each volume, enter the duration (in
milliseconds) that the buzzer should maintain the selected volume and
the duration (in milliseconds) that the buzzer should remain off before
advancing to the next volume in the cycle.
Fade Out: Set the tone volume to fade out before advancing to the
next volume in the cycle by clicking this checkbox.
Language: Set the language to use on the display (Korean, English, or
Custom).
Resource File: Set the language resource file to use for the BioStar interface
by clicking the ellipsis () button and locating the resource file.
Event Type: Set the type of event to assign to the key (Not Use, Check
In, Check Out, In, or Out). In/Out indicates the general check in/out
events during a day whereas Check In/Out indicates the formal check
in/out events upon arrival and departure at workor the first checkin
and the last checkout events on that day. When you choose Check In
or Check Out, you can enable the Regard as normal check-in/check-
out event option. If this option is enabled, users using the
appropriate keys will be regarded arriving or leaving on time at work
even though they actually come late or leave early. If you enable the
Only Result option, they appear being on time on T&A reports but
their work time will be calculated correctly based on their actual check
in/out time. If you choose Out, you can enable the Add work time
after this event option. If this option is enabled, users using the
appropriate key will be considered working for the remainder of the
time slot even though they leave the office early.
Wiegand Mode: Set the mode of Wiegand input to use when reading card
ID data (Legacy or Extended). The Legacy mode will process ID data from
networked devices and RF card readers in the same way (this is the typical
function of previous versions of BioStar). The Extended mode will allow RF
card readers to operate independently, which allows them to be associated
with doors, included in zones, and leave logs with their own device IDs.
Wiegand Input: Assign the Wiegand input:
Xpass Time
Date: Manually set the device date with a drop-down calendar.
Time: Manually set the device time.
Sync with Host PC Time: Check this box to get the time of the lcoal
PC which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option
and you can set the devices time to match this time by clicking Set
Time.
Get Time: Get the current time displayed by the device.
TCP/IP
Use DHCP: Click this radio button to enable the dynamic host
configuration protocol (DHCP) for the device.
Not Use DHCP: Click this radio button to disable the dynamic host
configuration protocol (DHCP) for this device.
IP Address: Specify an IP address for the device.
Subnet: Specify a subnet address for the device.
Gateway: Specify a network gateway.
Port: Specify a port to use for the device.
Support MTU Size setting
Devices affiliated with Black Fin support MTU Size setting. The supported
packet size is between 1078 and 1514, and the default is 1514.
Note: This feature is supported from the FW versions, BioEntry Plus 1.6,
BioEntry W 1.2, BioLite Net 1.4, Xpass 1.3.
Server
Use: Click this radio button to use specific server settings.
Not use: Click this radio button to disable server settings.
IP Address: Specify an IP address for the BioStar server.
Time sync with Server: Check this box to synchronize the device time
with the server. The device polls for a time change on the server every
one hour and its time will be synchronized with the server when the
devices time and the servers time differ by more than 5 seconds.
Support 100 Base-T: This option allows you to enable or disable a fast
Ethernet connection for the device. When enabled, the device will detect
the Ethernet network and automatically establish the best connection. If
you do not enable this option, the device will attempt to establish a
10Base-T Ethernet connection.
Use: Click this radio button to enable the 100base-T connection for
the device.
Not Use: Click this radio button to disable the 100base-T connection
for the device.
RS485
Mode: Set the mode for a device connected via RS485 (Disable, Host,
Slave, or PC Connection).
Baudrate: Set the baud rate for a device connected via RS485 (9600 to
115200).
T&A Mode: Set the time and attendance mode for the device
(Disable, Fixed In, Fixed Out, and Auto).
Fixed Entrance: When the Auto T&A mode is selected, specify when
to allow entrance events by selecting a timezone (Always, Disable, or
custom timezone) in the drop-down list. For more information on
creating a timezone, please see section 3.7.1.
Fixed Exit Time: When the Auto T&A mode is selected, specify when
to allow exit events by selecting a timezone (Always, Disable, or
custom timezone) in the drop-down list. For more information on
creating a timezone, please see section 3.7.1.
In Event Caption: Set a caption for check-in.
Out Event Caption: Set a caption for check-out.
Device: Select the Xpass (or Secure I/O) device for which you will add or
modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the radio buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
Not Use: The input port will not be monitored.
Generic Input: The input port will be monitored for a triggering action
(For the events specified with Detect Input 1-3 in the Output setting
dialog box, please see section 5.1.4.5).
Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a Close Door command via the Door/Zone
Monitoring tab (see section 4.4.1).
Release All Alarms: Cancel alarms associated with this device.
Restart Device: Restart the device.
Device Type: Select the device type for which you will add or modify
settings.
Port: select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port
Setting).
Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
Event: Select an event that will deactivate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on event (activate) can be overridden only by an
alarm off (deactivate) event with a priority of 1 or 2.
5.1.4.6 Blacklist
From BioStar 1.8, Blacklist feature is supported with Xpass.
(This feature is available only with FW 1.3v or higher.)
Card ID: Enter the card ID or click Read Card and place a command card on
the reader to automatically populate the fields.
Command Type: Select a type of command card to issue (Enroll Card, Delete
Card, or Delete All Card).
Event: Specify the affected event by selecting it from the drop-down list.
LED: Set the LED behavior for a specified event.
Count: Enter a number of LED cycles for the specified event. Enter 0
to enable an infinite loop or -1 to disable the LED.
Colors: Specify up to three display colors from the drop-down list. The
LED will cycle through these colors in order, from top to bottom. Next
to each color, enter the duration (in milliseconds) that the LED should
display the selected color and the duration (in milliseconds) that the
LED should remain off before advancing to the next color in the cycle.
Buzzer: Set the buzzer behavior for a specified event.
Count: Enter a number of buzzer cycles for the specified event. Enter
0 to enable an infinite loop or -1 to disable the buzzer.
Volume: Set up to three tone volumes from the drop-down list (Low,
Middle, or High). The buzzer will cycle through these volumes in order,
from top to bottom. Next to each volume, enter the duration (in
milliseconds) that the buzzer should maintain the selected volume and
the duration (in milliseconds) that the buzzer should remain off before
advancing to the next volume in the cycle.
Fade Out: Set the tone volume to fade out before advancing to the
next volume in the cycle by clicking this checkbox.
Wiegand Mode: Set the mode of Wiegand input to use when reading card
ID data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of previous
versions of BioStar). The Extended mode will allow RF card readers to
operate independently, which allows them to be associated with doors,
included in zones, and leave logs with their own device IDs.
Wiegand Input: Assign the Wiegand input:
Disabled: The input will not be used.
Wiegand [Card]: The ID field of the Wiegand string is interpreted as a
card ID.
Wiegand [User]: The ID field of the Wiegand string is interpreted as a
user ID.
Wiegand Output: Assign the Wiegand output:
Disabled: The output will not be used.
Wiegand [Card]: Inserts the card ID of the authenticated user in the
ID field of the Wiegand string.
Wiegand [User]: Inserts the user ID of the authenticated user in the
ID field of the Wiegand string.
Byte Order: Specify whether to swap ID card data between cards and
devices by most significant byte (MSB) or least significant byte (LSB).
Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
TCP/IP
Use DHCP: Click this radio button to enable the dynamic host
configuration protocol (DHCP) for the device.
Not Use DHCP: Click this radio button to disable the dynamic host
configuration protocol (DHCP) for this device.
IP: Specify an IP address for the device.
Subnet: Specify a subnet address for the device.
Gateway: Specify a network gateway.
Port: Specify a port to use for the device.
Server
Use: Click this radio button to use specific server settings.
Not use: Click this radio button to disable server settings.
IP Address: Specify an IP address for the BioStar server.
Time sync with Server: Check this box to synchronize the device
time with the server. The device polls for a time change on the server
every one hour and its time will be synchronized with the server when
the devices time and the servers time differ by more than 5 seconds.
Support 100 Base-T: This option allows you to enable or disable a fast
Ethernet connection for the device. When enabled, the device will detect
the Ethernet network and automatically establish the best connection. If
you do not enable this option, the device will attempt to establish a
10Base-T Ethernet connection.
Use: Click this radio button to enable the 100base-T connection for
the device.
Not Use: Click this radio button to disable the 100base-T connection
for the device.
RS485
Mode: Set the mode for a device connected via RS485 (Disable, Host,
Slave, or PC Connection).
Baudrate: Set the baud rate for a device connected via RS485 (9600 to
115200).
T&A Mode: Set the time and attendance mode for the device
(Disable, Fixed In, Fixed Out, and Auto).
Fixed Entrance: When the Auto T&A mode is selected, specify when
to allow entrance events by selecting a timezone (Always, Disable, or
custom timezone) in the drop-down list. For more information on
creating a timezone, please see section 3.7.1.
Fixed Exit Time: When the Auto T&A mode is selected, specify when
to allow exit events by selecting a timezone (Always, Disable, or
custom timezone) in the drop-down list. For more information on
creating a timezone, please see section 3.7.1.
In Event Caption: Seet a caption for check-in.
Out Event Caption: Set a caption for check-out.
Device: Select the Xpass Slim (or Secure I/O) device for which you will add or
modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, the following options are available: Input 0, Input 1, Input 2, Input
3.
Switch: Click the radio buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
Not Use: The input port will not be monitored.
Generic Input: The input port will be monitored for a triggering action
(events specified with Detect Input 1-3 in the Output Setting dialog
box see section 5.1.5.5).
Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a Close Door command via the Door/Zone
Monitoring tab (see section 4.4.1).
Device Type: Select the device type for which you will add or modify
settings.
Port: Select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port
Setting).
Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
Event: Select an event that will deactivate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on event (activate) can be overridden only by an
alarm off (deactivate) event with a priority of 1 or 2.
Card ID: Enter the card ID or click Read Card and place a command card on
the reader to automatically populate the fields.
Command Type: Select a type of command card to issue (Enroll Card, Delete
Card, or Delete All Card).
Event: Specify the affected event by selecting it from the drop-down list.
LED: Set the LED behavior for a specified event.
Count: Enter a number of LED cycles for the specified event. Enter 0
to enable an infinite loop or -1 to disable the LED.
Colors: Specify up to three display colors from the drop-down list. The
LED will cycle through these colors in order, from top to bottom. Next
to each color, enter the duration (in milliseconds) that the LED should
display the selected color and the duration (in milliseconds) that the
LED should remain off before advancing to the next color in the cycle.
Buzzer: Set the buzzer behavior for a specified event.
Count: Enter a number of buzzer cycles for the specified event. Enter
0 to enable an infinite loop or -1 to disable the buzzer.
Volume: Set up to three tone volumes from the drop-down list (Low,
Middle, or High). The buzzer will cycle through these volumes in order,
from top to bottom. Next to each volume, enter the duration (in
milliseconds) that the buzzer should maintain the selected volume and
the duration (in milliseconds) that the buzzer should remain off before
advancing to the next volume in the cycle.
Fade Out: Set the tone volume to fade out before advancing to the
next volume in the cycle by clicking this checkbox.
Wiegand Mode: Set the mode of Wiegand input to use when reading card
ID data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of previous
D-Station Time
Date: Manually set the device date with a drop-down calendar.
Time: Manually set the device time.
Sync with Host PC Time: Check this box to get the time of the lcoal
PC which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option
and you can set the devices time to match this time by clicking Set
Time.
Get Time: Get the current time displayed by the device.
Set Time: Set the time on the device.
1: 1 Operation Mode: The drop-down lists in this area allow you to control
the authentication mode by schedule. For example, you can choose a
normal authentication mode for working hours and a more strict
authentication mode for hours outside the normal schedule. You can
specify authentication modes either by device or by user (see section 5.4.1).
Unless a particular mode is specified for a user, the device authentication
mode will apply.
ID/Card + Fingerprint: Set the device to require ID or card plus
fingerprint authorization (Always, or No Time).
ID/Card + Password: Set the device to require ID or card plus
password authorization (Always, or No Time).
ID/Card + Fingerprint/Password: Set the device to require ID or card
plus fingerprint or password authorization (Always, or No Time).
Card Only: Set the device to require only card authorization (Always,
or No Time).
ID/Card + Fingerprint + Password: Set the device to require ID or
card plus fingerprint plus password authorization (Always, or No Time).
1: N Operation
1: N Schedule: Set a schedule for using fingerprint only authentication
(Always, or No Time).
1: N Operation Mode: Set a method for activating the fingerprint sensor
(Auto, Ok/Function Key, or None).
Two Sensor Mode
Fast Mode: The device will provide the quickest authentication.
Fusion Mode: Authentication is provided by a fusion algorithm that
allowes users to scan either of two registered fingers and increases the
authentication rate for each finger.
Twin Mode: Each sensor works independently to authenticate up to
two users simultaneously.
Detect Face: Set the device to capture a face image. Upon successful
authentication, the captured image is stored in the event log and can be
used later for verification purposes.
Face Fusion: Set the device to use face fusion for authentication. This setting
can improve authentication rates for some users. This setting can be used
in conjunction with either the Fast Mode or the Fusion Mode in the Two
Sensor Mode setting.
Fusion Time out: Set the device to automatically time out after a specified
number of minutes, if authentication is unsuccessful (1-20).
Interphone: Set the device to act as an interphone to allow communication
between people on either side of the door (Not Use or Use).
Other options
Private Auth: Set the device to allow a private authorization method
(Disable or Enable). If enabled, the authentication mode of the user will
be determined by a users Authorization setting, which is located on
the Details tab. If disabled, the authentication mode will be
determined by operation mode settings of the device.
Double Mode: Set the device to require authentication of two users
access cards or fingerprints (Always, or No Time). The timeout for
presenting the second authentication is 15 seconds.
Mifare
Not use Mifare: Check this box to disable MIFARE card authorization.
Use Template on Card: Ceck this box to use the template on the
MIFARE card for authorization.
View Mifare Layout: Click this button to view the MIFARE layout used
by the device. For more information about configuring MIFARE
layouts, please see section 3.6.4.7.
ISO Format
Format Type: Set the type of pre-processing to occur on card ID data
(Normal or Wiegand). If Normal is selected, the card ID data will be
processed in its original form. If Wiegand is selected, devices will
interpret card ID data according to the Wiegand format settings.
Byte Order: Specify whether to swap ID card data between cards and
devices by most significant byte (MSB) or least significant byte (LSB).
Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
Fingerprint
Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
Image Quality: Set the strictness of the quality check for fingerprint
scans (Weak, Normal, or Strict). If a fingerprint image is below the
specified quality level, it will be rejected.
Sensitivity: Set the sensitivity of the fingerprint scanner (0 [Min] to 7
[Max]). A higher sensitivity setting will result in more easily captured
fingerprint scans, but also increases the sensitivity to external noise.
1: N Delay: Set the delay between scans when identifying fingerprints
(0 sec to 10 sec). This delay prevents the scanner from processing the
same fingerprint more than once if a user has not yet removed his or
her finger from the scanner.
Server Matching: Enable this setting to perform fingerprint or card ID
matching at the BioStar server, instead of the device. When this mode
is enabled, the devices will send the fingerprint template or card ID to
the server to verify a match. This mode is useful when you have more
users than can be downloaded to a device or user information cannot
be distributed due to security concerns.
1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal, Fast,
or Fastest). Setting Fast Mode to Auto will adjust the matching speed
according to the number of enrolled templates.
TCP/IP Setting
LAN Type: Select a type of LAN connection from the drop-down list
(Disable, Ethernet, or Wireless LAN).
Port: Specify a port to use for the device.
WLAN
Change setting: Click to specify settings for a wireless local area
network (WLAN). This option is active only when WLAN is selected as
the TCP/IP setting. For more information about configuring settings
for a WLAN, please see section 3.2.4.
IP
Use DHCP: Click this radio button to enable the dynamic host
configuration protocol (DHCP) for the device.
Not Use DHCP: Click this radio button to disable the dynamic host
configuration protocol (DHCP) for this device.
IP Address: Specify an IP address for the device.
Subnet: Specify a subnet address for the device.
Gateway: Specify a network gateway.
Max Conn.: Specify the maximum number of connections to allow.
Server
Use: Click this radio button to enable the server mode.
Not use: Click this radio button do disable server settings.
IP Address: Specify an IP address for the BioStar server.
Server Port: Specify the port used to connect to the server.
SSL: Displays the status of SSL for the server connection.
Time sync with Server: Check this box to synchronize the device time
with the server. The device polls for a time change on the server every
one hour and its time will be synchronized with the server when the
devices time and the servers time differ by more than 5 seconds.
RS485 Network
Mode: Set the mode for a device connected via RS485 (Disable, Host,
or Slave). For more information about RS485 modes, please see
sections 3.2.1 and 3.2.2.
RS485
Baudrate: Set the baud rate for a device connected via RS485 (9600 to
115200).
RS232
Baudrate: Set the baud rate for a device connected via RS232 (9600 to
115200).
USB Setting: Click the radio buttons to enable or disable the USB port on
the D-Station device.
Device: Select the D-Station device for which you will add or modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the radio buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
Not Use: The input port will not be monitored.
Generic Input: The input port will be monitored for a triggering action
(For the events specified with Detect Input 0-3 in the Output
Setting dialog box, please see section 5.1.1.6).
Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a Close Door command via the Door/Zone
Monitoring tab (see section 4.4.1).
Release All Alarms: Cancel alarms associated with this device.
Restart Device: Restart the device.
Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process fingerprints or card
inputs. To enable communication again, an administrator must provide
authentication at the device.
Schedule: Set the schedule during which the inputs will be monitored
(Always or No Time).
Duration (ms): Set the duration (in milliseconds) an input signal must last to
trigger the specified action.
Device Type: Select the device type for which you will add or modify
settings.
Port: select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port
Setting).
Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
Event: Select an event that will deactivate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, a priority 2 alarm on event (activate) can be overridden
only by an alarm off (deactivate) event with a priority of 1 or 2.
Current Count: Indicates the total number of user IDs and access cards that
have been registered.
Reserved: Indicates the remaining number of user IDs and access cards that
can be registered.
Display/Sound
Menu Timeout: Set the length of time before the display will return to
the idle screen.
Backlight Timeout: Set the length of time before the display goes
dim.
Theme: Set a display theme.
Background: Set the type of background for the BioStation display
(Logo, Notice, or Slide Show). Supported file types (JPG, GIF, BMP, and
PNG) cannot exceed 320x240 pixels each. Only one image at a time
can be used as a logo or notice, while up to 16 images can be
displayed (at a set interval) in a slide show.
Notice: Click this button to create a notice that will be shown on the
BioStation display. After creating a notice, you can click Apply to apply
the notice to the current device or Apply to Others to apply the
notice to additional devices.
Volume: Set the volume of the BioStation device (10% to 100%).
Msg Timeout: Set the length of time that a failure or confirmation
message will be displayed.
Background Image: Click this checkbox to upload new background images.
Click the plus sign (+) to locate and add a new image file.
Type: Set the type of background for the BioStation display (Logo or
Notice). Supported file types (JPG, GIF, BMP, and PNG) cannot exceed
800x427 pixels for Notices and 800x327 pixels for Logos. Only one
image at a time can be used as a logo or notice.
Sound: Click this checkbox to enable and add custom event sounds. Click an
event from the list and then click the plus sign (+) to locate and add a new
sound file. Click Add to add new sound files, Delete to remove sound files,
or Play to preview a selected sound file.
Wiegand Mode: Set the mode of Wiegand input to use when reading card
ID data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of previous
versions of BioStar). The Extended mode will allow RF card readers to
X-Station Time
Date: Manually set the device date with a drop-down calendar.
Time: Manually set the device time.
Sync with Host PC Time: Check this box to get the time of the lcoal
PC which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option
and you can set the devices time to match this time by clicking Set
Time.
Get Time: Get the current time displayed by the device.
Set Time: Set the time on the device.
1: 1 Operation Mode: The drop-down lists in this area allow you to control
the authentication mode by schedule. For example, you can choose a
normal authentication mode for working hours and a more strict
authentication mode for hours outside the normal schedule. You can
specify authentication modes either by device or by user (see section 5.4.1).
Unless a particular mode is specified for a user, the device authentication
mode will apply.
Card Only: Set the device to require only card authorization (No Time,
First Shift, or Always).
ID/Card + Password: Set the device to require ID or card plus
password authorization (No Time, First Shift, or Always).
Private Auth: Set the device to allow a private authorization method (Disable
or Enable). If enabled, the authentication mode of the user will be
determined by a users Authorization setting, which is located on the
Details tab. If disabled, the authentication mode will be determined by
operation mode settings of the device.
Double Mode: Set the device to require authentication of two users access
cards or fingerprints (Always, or No Time). The timeout for presenting the
second authentication is 15 seconds.
Server Matching: Enable this setting to perform card ID matching at the
BioStar server, instead of the device. When this mode is enabled, the device
will send card ID to the server to verify a match. This mode is useful when
you have more users than can be downloaded to a device or user
information cannot be distributed due to security concerns.
Auth Timeout: Set the length of time before the device will timeout when
trying to identify an ID match (5, 10, 15, 20, or 30 sec).
Detect Face: Set the device to capture a face image. Upon successful
authentication, the captured image is stored in the event log and can be
used later for verification purposes.
Mifare
Not use Mifare: Check this box to disable MIFARE card authorization.
Use Data Card: Check this box to use the template on the MIFARE
card for authorization.
View Mifare Layout: Click this button to view the MIFARE layout used
by the device. For more information about configuring MIFARE
layouts, please see section 3.6.4.7.
Card ID Format
Format Type: Set the type of pre-processing to occur on card ID data
(Normal or Wiegand). If Normal is selected, the card ID data will be
processed in its original form. If Wiegand is selected, devices will
interpret card ID data according to the Wiegand format settings.
Byte Order: Specify whether to swap ID card data between cards and
devices by most significant byte (MSB) or least significant byte (LSB).
Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
TCP/IP Setting
LAN Type: Select a type of LAN connection from the drop-down list
(Disable, or Ethernet).
Port: Specify a port to use for the device.
IP
Use DHCP: Click this radio button to enable the dynamic host
configuration protocol (DHCP) for the device.
Not Use DHCP: Click this radio button to disable the dynamic host
configuration protocol (DHCP) for this device.
IP Address: Specify an IP address for the device.
Subnet: Specify a subnet address for the device.
Gateway: Specify a network gateway.
Max Conn.: Specify the maximum number of connections to allow.
Server
Use: Click this radio button to enable the server mode.
Not use: Click this radio button do disable server settings.
IP Address: Specify an IP address for the BioStar server.
Server Port: Specify the port used to connect to the server.
Time sync with Server: Check this box to synchronize the device time
with the server. The device polls for a time change on the server every
one hour and its time will be synchronized with the server when the
devices time and the servers time differ by more than 5 seconds.
RS485 Network
Mode: Set the mode for a device connected via RS485 (Disable, Host,
or Slave). For more information about RS485 modes, please see
sections 3.2.1 and 3.2.2.
RS485
Baudrate: Set the baud rate for a device connected via RS485 (9600 to
115200).
gained entry, the device will reject the users card or fingerprint
authorization for the time period specified here.
Option 1-4: Click the checkbox to enable an entrance limit setting,
and then specify the effective hours for the entrance limit.
Max Number of Entrance: Set the maximum number of entries
allowed during the specified time limit.
Default Group Setting: Select a default access group to be applied to new
users who have not been assigned to another access group.
Device: Select the X-Station device for which you will add or modify settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the radio buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
Not Use: The input port will not be monitored.
Generic Input: The input port will be monitored for a triggering action
(For the events specified with Detect Input 0-3 in the Output
Setting dialog box, please see section 5.1.1.6).
Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a Close Door command via the Door/Zone
Monitoring tab (see section 4.4.1).
Device Type: Select the device type for which you will add or modify
settings.
Port: select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Closed,
Forced Open Door, Held Open Door, Detect Input #0-3).
Current Count: The total number of user IDs and access cards that have
been registered.
Reserved: The remaining number of user IDs and access cards that can be
registered.
Display/Sound
Language: Set the language to use on the display (Korean, English, or
Custom).
Menu Timeout: Set the length of time before the display will return to
the idle screen.
Back Light Timeout: Set the length of time before the display goes
dim (Infinite, 10, 20, 30, 40, 50, or 60 sec).
Theme: Set a display theme (Theme 1-3).
Resource File: Set the language resource file to use for the
X-Station interface (No Change, English, Korean, or Custom). To use a
language resource file other than English or Korean, select Custom and
then click the ellipsis () button to locate the resource file.
Background: Set the type of background for the X-Station display
(Logo, Notice, or Slide Show). Supported file types (JPG, GIF, BMP, and
PNG) cannot exceed 240x320 pixels each. Only one image at a time
can be used as a logo or notice, while up to 16 images can be
displayed (at a set interval) in a slide show.
Notice: Click this button to create a notice that will be shown on the
X-Station display. After creating a notice, you can click Apply to apply
the notice to the current device or Apply to Others to apply the
notice to additional devices.
Volume: Set the volume of the X-Station device (0% to 100%).
Wiegand Mode: Set the mode of Wiegand input to use when reading card
ID data (Legacy or Extended). The Legacy mode will process ID data from
networked devices and RF card readers in the same way (this is the typical
function of previous versions of BioStar). The Extended mode will allow RF
card readers to operate independently, which allows them to be associated
with doors, included in zones, and leave logs with their own device IDs.
Wiegand In/Out: Assign the function of the Wiegand input or output:
Wiegand (User) In: The ID field of the Wiegand string is interpreted
as a user ID.
Wiegand (Card) In: The ID field of the Wiegand string is interpreted
as a card ID.
Wiegand (User) Out: Inserts the user ID of the authenticated user in
the ID field of the Wiegand string.
Wiegand (Card) Out: Inserts the card ID of the authenticated user in
the ID field of the Wiegand string.
BioStation T2 Time
Date: Manually set the device date with a drop-down calendar.
Time: Manually set the device time.
Sync with Host PC Time: Check this box to get the time of the lcoal
PC which BioStar client program is installed on. The time will be
displayed in the Date and Time spin boxes right below this option
and you can set the devices time to match this time by clicking Set
Time.
Get Time: Get the current time displayed by the device.
Set Time: Set the time on the device.
ID Operation Mode: The drop-down lists in this area allow you to control
the authentication mode by schedule. For example, you can choose a
normal authentication mode for working hours and a more strict
authentication mode for hours outside the normal schedule. You can
specify authentication modes either by device or by user (see section 5.4.1).
Unless a particular mode is specified for a user, the device authentication
mode will apply.
ID + Fingerprint: Set the device to require ID plus fingerprint
authorization (Always, or No Time).
ID + Password: Set the device to require ID plus password
authorization (Always, or No Time).
ID + Fingerprint/Password: Set the device to require ID plus
fingerprint or password authorization (Always, or No Time).
Mifare
Not use Mifare: Check this box to disable MIFARE card authorization.
Use Template on Card: Check this box to use the template on the
MIFARE card for authorization.
View Mifare Layout: Click this button to view the MIFARE layout used
by the device. For more information about configuring MIFARE
layouts, please see section 3.6.4.7.
Card ID Format
Format Type: Set the type of pre-processing to occur on card ID
data (Normal or Wiegand). If Normal is selected, the card ID data
will be processed in its original form. If Wiegand is selected,
devices will interpret card ID data according to the Wiegand format
settings.
Byte Order: Specify whether to swap ID card data between cards
and devices by most significant byte (MSB) or least significant byte
(LSB).
Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
In Double mode, setting option which includes an admin user is
supported. In Double mode, door relay will not open unless an
admin user authenticates within 15 seconds after a normal user
authenticates. If this option is not activated, the door relay will open
when other two users, regardless of whether being a normal user or
an admin user.
Note: This feature is supported from the FW versions, BioStation 1.93,
BioStation T2 1.3, FaceStation 1.3, BioEntry Plus 1.6, BioEntry W 1.2,
BioLite Net 1.4, Xpass 1.3.
Use Wiegand Card Bypass: This feature makes the device to send out
Card CSN according to Wiegand setting of BioStar without having to
conduct a matching. This is designed to be used as a dummy reader
in a connection with a third party access control unit through
Wiegand. When a card data input is made, the device sends out the
data through Wiegand without going through a matching process.
Note: This feature is supported from the FW versions, BioStation 1.93,
BioStation T2 1.3, FaceStation 1.3, BioEntry Plus 1.6, BioEntry W 1.2,
BioLite Net 1.4, Xpass 1.3.
Fingerprint
Security Level: Set the security level to use for fingerprint
authorization (Normal, Secure, or Most Secure). Keep in mind that as
the security level is increased, so too is the likelihood of a false
rejection.
Sensitivity: Set the sensitivity of the fingerprint scanner (0 [Min] to 7
[Max]). A higher sensitivity setting will result in more easily captured
fingerprint scans, but also increases the sensitivity to external noise.
Scan Timeout: Set the length of time before the fingerprint scanner
will timeout (1 sec to 20 sec). If a user does not place a finger on the
device within the timeout period, the authorization will fail.
1: N Fast Mode: Set the device to use Fast Mode to reduce the
amount of time required for matching fingerprints (Auto, Normal, Fast,
or Fastest). Setting Fast Mode to Auto will adjust the matching speed
according to the number of enrolled templates.
View Image: Set to show or hide fingerprint images on the BioStation
T2 display (Yes or No).
Check Fake Finger: Set the device to detect the use of fake
fingerprints, such as those made from silicon or rubber, and prevent
unauthorized access.
Template Option: Displays the global fingerprint template settings.
For more information about fingerprint templates, see section 4.9.
TCP/IP Setting
LAN Type: Select a type of LAN connection from the drop-down list
(Disable, Ethernet, or Wireless LAN).
Port: Specify a port to use for the device.
WLAN
Change setting: Click to specify settings for a wireless local area
network (WLAN). This option is active only when WLAN is selected as
the TCP/IP setting. For more information about configuring settings
for a WLAN, see section 3.2.4.
IP
Use DHCP: Click this radio button to enable the dynamic host
configuration protocol (DHCP) for the device.
Not Use DHCP: Click this radio button to disable the dynamic host
configuration protocol (DHCP) for this device.
IP Address: Specify an IP address for the device.
Subnet: Specify a subnet address for the device.
Gateway: Specify a network gateway.
Max Conn.: Specify the maximum number of connections to allow.
Server
Use: Click this radio button to enable the server mode.
Not use: Click this radio button do disable server settings.
IP Address: Specify an IP address for the BioStar server.
Server Port: Specify the port used to connect to the server.
Time sync with Server: Check this box to synchronize the device time
with the server. The device polls for a time change on the server every
one hour and its time will be synchronized with the server when the
devices time and the servers time differ by more than 5 seconds.
RS485 Network
Mode: Set the mode for a device connected via RS485 (Disable, Host,
or Slave). For more information about RS485 modes, please see
sections 3.2.1 and 3.2.2.
RS485
Baudrate: Set the baud rate for a device connected via RS485 (9600 to
115200).
RS232
Baudrate: Set the baud rate for a device connected via RS232 (9600 to
115200).
USB: Click the radio buttons to enable or disable the USB port on the
BioStation T2 device.
USB Memory: Click the radio buttons to enable or disable the USB memory
on the BioStation T2 device.
Device: Select the BioStation T2 device for which you will add or modify
settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the radio buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
Not Use: The input port will not be monitored.
Generic Input: The input port will be monitored for a triggering action
(events specified with Detect Input 0-3 in the Output Setting dialog
box see section 5.1.1.6).
Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a Close Door command via the Door/Zone
Monitoring tab (see section 4.4.1).
Release All Alarms: Cancel alarms associated with this device.
Restart Device: Restart the device.
Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process fingerprints or card
inputs. To enable communication again, an administrator must provide
authentication at the device.
Schedule: Set the schedule during which the inputs will be monitored
(Always or No Time).
Duration (ms): Set the duration (in milliseconds) an input signal must last to
trigger the specified action.
Device Type: Select the device type for which you will add or modify
settings.
Port: Select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port
Setting).
Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
Event: Select an event that will deactivate an alarm (Auth Success, Auth
Fail, Auth Duress, Anti-passback Fail, Access Not Granted, Entrance
Limited, Admin Auth Success, Tamper On, Door Opened, Door Close,
Forced Open Door, Held Open Door, or Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Priority: Set a priority for the event. Only an event with an equal or higher priority
(1 is the highest) can override a previous event. For example, a priority 2 alarm on
event (activate) can be overridden only by an alarm off (deactivate) event with a
priority of 1 or 2.
Current Count: The total number of the user IDs and access cards that have
been registered.
Reserved : The remaining number of user IDs and access cards to be
registered.
Display/Sound
Language: Set the language to use on the display (Korean, English, or
Custom).
Menu Timeout: Set the length of time before the display will return to
the idle screen.
Backlight Timeout: Set the length of time before the display goes
dim.
Theme: set a display theme.
Use Voice: Set the device to notify you with voice messages (Disable
or Enable).
Resource File: Set the language resource file to use for the BioStar
interface (No Change, English, Korean, or Custom). To use a language
resource file other than English or Korean, select Custom and then
click the ellipsis () button to locate the resource file.
Background: Set the type of background for the BioStation T2 display
(Logo, Notice, or Slide Show). Supported file types (JPG, GIF, BMP, PNG
and PDF) cannot exceed 480x800 pixels each. Only one image at a
Manual Fix: When a T&A key is pressed, the device will remain in that
mode until a different T&A key is pressed.
Auto change: The device will automatically change T&A modes to
correspond with the functions specified for a time period.
Event Fix: The device will perform only the specified T&A function.
T&A Key: Specify which keys to use for T&A events and the event types
associated with them:
Function Key: Select a function key from the drop-down list to assign
a T&A event (F1-F4, EXT01-EXT12). If you are using the Event Fix
mode, you can click the checkbox to the right to designate a fixed
event.
Event Caption: Enter a caption for the event.
Auto Mode Schedule: When using the Auto Change mode, you can
specify when the event will occur by selecting a timezone in the drop-
down list. For more information on creating a timezone, please see
section 3.7.1.
Event Type: Set the type of event to assign to the key (Not Use, Check
In, Check Out, In, or Out). In/Out indicates the general check in/out
events during a day whereas Check In/Out indicates the formal check
in/out events upon arrival and departure at workor the first checkin
and the last checkout events on that day. When you choose Check In
or Check Out, you can enable the Regard as normal check-in/check-
out event option. If this option is enabled, users who activate the
appropriate keys will be regarded as arriving or leaving on time at
work even though they actually arrive late or leave early. If you enable
the Only Result option, they appear being on time on T&A reports
but their work time will be calculated correctly based on their actual
check in/out time. If you choose Out, you can enable the Add work
time after this event option. If this option is enabled, users activating
the appropriate key will be considered working for the remainder of
the time slot even if they leave the office early.
Wiegand Mode: Set the mode of Wiegand input to use when reading card
ID data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of previous
versions of BioStar). The Extended mode will allow RF card readers to
operate independently, which allows them to be associated with doors,
included in zones, and leave logs with their own device IDs.
Wiegand In/Out: Assign the Wiegand input or output:
Wiegand (User) In: The ID field of the Wiegand string is interpreted
as a user ID.
Wiegand (Card) In: The ID field of the Wiegand string is interpreted
as a card ID.
Wiegand (User) Out: Inserts the user ID of the authenticated user in
the ID field of the Wiegand string.
Wiegand (Card) Out: Inserts the card ID of the authenticated user in
the ID field of the Wiegand string.
FaceStation Time
Date: Manually set the device date with a drop-down calendar.
Time: Manually set the device time.
Sync with Host PC Time: Check this box to automatically synchronize
the device time with the time of the host computer.
Get Time: Get the current time displayed by the device.
Set Time: Set the time on the device.
ID Operation Mode: The drop-down lists in this area allow you to control
the authentication mode by schedule. For example, you can choose a
normal authentication mode for working hours and a more strict
authentication mode for hours outside the normal schedule. You can
specify authentication modes either by device or by user (see section 5.4.1).
Unless a particular mode is specified for a user, the device authentication
mode will apply.
ID + Face: Set the device to require ID plus face recognition for
authorization (Always, New Time Zone, or No Time).
ID + Password: Set the device to require ID plus password
authorization (Always, New Time Zone, or No Time).
ID + Face/Password: Set the device to require ID plus face
recognition or password authorization (Always, New Time Zone, or No
Time).
ID + Face + Password: Set the device to require ID plus face
recognition plus password authorization (Always, New Time Zone, or
No Time).
Matching Timeout: Set the length of time before the device will
timeout when trying to identify a fingerprint match within the device
itself or via the server (3, 7, 10, 15, 20, 30 sec).
Mifare
Not use Mifare: Check this box to disable MIFARE card authorization.
Use Template on Card: Not available with FaceSation devices.
View Mifare Layout: Not available with FaceSation devices.
Card ID Format
Format Type: Set the type of pre-processing to occur on card ID data
(Normal or Wiegand). If Normal is selected, the card ID data will be
processed in its original form. If Wiegand is selected, devices will
interpret card ID data according to the Wiegand format settings.
Byte Order: Specify whether to swap ID card data between cards and
devices by most significant byte (MSB) or least significant byte (LSB).
Bit Order: Specify whether to swap ID card data between cards and
devices by most significant bit (MSB) or least significant bit (LSB).
Security Level: Set the security level to use for face recognition (Normal,
Secure, or Most Secure). Keep in mind that as the security level is increased,
so too is the likelihood of a false rejection.
Enroll Sensitivity: Set the sensitivity of the face recognition system (0 [Min]
to 9 [Max]). A higher sensitivity setting will result in easier face recognition,
but also increases the sensitivity to external visual noise.
Use Templete Image: Set whether or not to display user face template
images in the FaceStation device.
TCP/IP Setting
LAN Type: Select a type of LAN connection from the drop-down list
(Disable, Ethernet, or Wireless LAN).
Port: Specify a port to use for the device.
WLAN
Change setting: Click to specify settings for a wireless local area
network (WLAN). This option is active only when WLAN is selected as
the TCP/IP setting. For more information about configuring settings
for a WLAN, please see section 3.2.4.
IP
Use DHCP: Click this radio button to enable the dynamic host
configuration protocol (DHCP) for the device.
Not Use DHCP: Click this radio button to disable the dynamic host
configuration protocol (DHCP) for this device.
IP Address: Specify an IP address for the device.
Subnet: Specify a subnet address for the device.
Gateway: Specify a network gateway.
Max Conn.: Specify the maximum number of connections to allow.
Server
Use: Click this radio button to enable the server mode.
Not use: Click this radio button do disable server settings.
IP Address: Specify an IP address for the BioStar server.
Server Port: Specify the port used to connect to the server.
Time sync with Server: Check this box to synchronize the device time
with the server. The device polls for a time change on the server every
one hour and its time will be synchronized with the server when the
devices time and the servers time differ by more than 5 seconds.
RS485 Network
Mode: Set the mode for a device connected via RS485 (Disable, Host,
or Slave). For more information about RS485 modes, please see
sections 3.2.1 and 3.2.2.
RS485
Baudrate: Set the baud rate for a device connected via RS485 (9600 to
115200).
RS232
Baudrate: Set the baud rate for a device connected via RS232 (9600 to
115200).
USB: Click the radio buttons to enable or disable the USB port on the
FaceStation device.
USB Memory: Click the radio buttons to enable or disable the USB memory
on the FaceStation device.
Device: Select the FaceStation device for which you will add or modify
settings.
Port: Select an input port (Input 0, Input 1, or Tamper). For Secure I/O
devices, these settings are available: Input 0, Input 1, Input 2, Input 3.
Switch: Click the radio buttons to specify the normal position of the input
switch (N/O: normally open or N/C: normally closed).
Function: Select an action to associate with the input:
Not Use: The input port will not be monitored.
Generic Input: The input port will be monitored for a triggering action
(events specified with Detect Input 0-3 in the Output Setting dialog
box see section 5.1.1.6).
Emergency Open: Open doors controlled by this device. The normal
door open period will be ignored and doors will remain open until an
operator sends a Close Door command via the Door/Zone
Monitoring tab (see section 4.4.1).
Release All Alarms: Cancel alarms associated with this device.
Restart Device: Restart the device.
Disable Device: Disable the device. A disabled device will not
communicate with the BioStar server or process face or card inputs. To
enable communication again, an administrator must provide
authentication at the device.
Schedule: Set the schedule during which the inputs will be monitored
(Always or No Time).
Duration (ms): Set the duration (in milliseconds) an input signal must last to
trigger the specified action.
Device Type: Select the device type for which you will add or modify
settings.
Port: select an output port (Relay 0). For Secure I/O devices, these settings
are available: Relay 0 or Relay 1.
Alarm On Event: Specify settings and click Add to add the event to the
Alarm On Event list. These events will activate an alarm.
Event: Select an event that will activate an alarm (Auth Success, Auth
Fail, Anti-passback Fail, Access Not Granted, Entrance Limited, Admin
Auth Success, Tamper On, Door Opened, Door Close, Forced Open Door,
Held Open Door, Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Signal Setting: Select a signal setting that you have previously
configured from the menu bar (Option > Event > Output Port
Setting).
Priority: Set a priority for the event. Only an event with an equal or
higher priority (1 is the highest) can override a previous event. For
example, an alarm on (activate) event with a priority of 2 can be
canceled only by an alarm off (deactivate) event with a priority of 1 or
2.
Alarm Off Event: Specify settings and click Add to add the event to the
Alarm Off Event list. These events will deactivate an alarm.
Event: Select an event that will deactivate an alarm (Auth Success, Auth
Fail, Anti-passback Fail, Access Not Granted, Entrance Limited, Admin
Auth Success, Tamper On, Door Opened, Door Close, Forced Open Door,
Held Open Door, or Detect Input #1-3).
Device: Select the device to monitor for an alarm event.
Priority: Set a priority for the event. Only an event with an equal or higher
priority (1 is the highest) can override a previous event. For example, a
priority 2 alarm on event (activate) can be overridden only by an alarm
off (deactivate) event with a priority of 1 or 2.
Display/Sound
Language: Set the language to use on the display (Korean, English, or
Custom).
Menu Timeout: Set the length of time before the display will return to
the idle screen (Infinite, 10 sec, 20 sec, or 30 sec).
Backlight Timeout: Set the length of time before the display goes
dim (Infinite, 10 sec, 20 sec, 30 sec, 40 sec, 50 sec, or 60 sec).
Theme: set a display theme (Theme 1-4)
Use Voice: Set the device to notify you with voice messages (Disable
or Enable).
Resource File: Set the language resource file to use for the BioStar
interface (No Change, Korean, English, or Custom). To use a language
resource file other than English or Korean, select Custom and then
click the ellipsis () button to locate the resource file.
Background: Set the type of background for the FaceStation display
(Logo, Notice, Slide Show, or PDF). Supported file types (JPG, GIF, BMP,
PNG and PDF) cannot exceed 480x800 pixels each. Only one image at
a time can be used as a logo or notice, while up to 16 images can be
displayed (at a set interval) in a slide show.
Volume: Set the volume of the FaceStation device (0% to 100%).
Msg Timeout: Set the length of time that a failure or confirmation
message will be displayed (0.5-5 sec).
Clock Display: Set to display the current time on the device (Enable or
Disable).
Background Image: Click this checkbox to upload new background images.
Click the plus sign (+) to locate and add a new image file.
Type: Set the type of background for the FaceStation display (Logo,
Notice, Slide Show, or PDF). Supported file types (JPG, GIF, BMP, PNG
and PDF) cannot exceed 480x800 pixels for Notices and 480x800 pixels
for Logos. Only one image at a time can be used as a logo or notice.
Sound: Click this checkbox to enable and add custom event sounds. Click an
event from the list and then click the plus sign (+) to locate and add a new
sound file. Click Add to add new sound files, Delete to remove sound files,
or Play to preview a selected sound file.
Event Type: Set the type of event to assign to the key (Not Use, Check
In, Check Out, In, or Out). In/Out indicates the general check in/out
events during a day whereas Check In/Out indicates the formal check
in/out events upon arrival and departure at workor the first checkin
and the last checkout events on that day. When you choose Check In
or Check Out, you can enable the Regard as normal check-in/check-
out event option. If this option is enabled, users who activate the
appropriate keys will be regarded as arriving or leaving on time at
work even though they actually arrive late or leave early. If you enable
the Only Result option, they appear being on time on T&A reports
but their work time will be calculated correctly based on their actual
check in/out time. If you choose Out, you can enable the Add work
time after this event option. If this option is enabled, users activating
the appropriate key will be considered working for the remainder of
the time slot even if they leave the office early.
Wiegand Mode: Set the mode of Wiegand input to use when reading card
ID data (Legacy or Extended). The Legacy mode will treat connected RF
devices as part of their host devices (this is the typical function of previous
versions of BioStar). The Extended mode will allow RF card readers to
operate independently, which allows them to be associated with doors,
included in zones, and leave logs with their own device IDs.
Wiegand In/Out: Assign the Wiegand input or output:
Wiegand (User) In: The ID field of the Wiegand string is interpreted
as a user ID.
IO Device: When using two devices on a single door, specify which devices IO ports will
be used.
Door Relay: Select a door relay.
Exit Button: Select a device input to use for an exit button (Disable or Input 0 and Input
1 for each device added).
(Switch Type): Set the normal position of the input used for an exit button (N/O-
normally open or N/C-normally closed).
Door Status: set an input for a sensor that detects the current status of the door.
(Switch Type): Set the normal position of the input used for a door status sensor (N/O-
normally open or N/C-normally closed).
Door Open Period (sec): Set the duration (in seconds) that a door relay should be
activated when a door is opened. After this duration, the relay will stop sending the
signal to open the door. The default is three seconds.
Door Open Alarm (sec): Set the duration (in seconds) that a door can remain open
before an alarm will sound.
Driven by: Select types of events that will trigger associated devices to open the door.
All Events (default): Associated devices will open the door on any successful
authorization events.
TNA + AUTH: Associated devices will open the door on successful T&A or
credential authorization events or T&A authorization events. To use this option, you
must select the Use Relay checkbox in the T&A tab. This option is only available for
BioStation, BioLite Net, D-Station, X-Station, BioStation T2, and FaceStation devices.
For more information about configuring T&A settings, see section 5.1.1.9, 5.1.3.9,
5.1.6.11, 5.1.7.10, and 5.1.8.11.
AUTH: Associated devices will open the door only on successful credential
authorization events.
TNA: Associated devices will open the door only on successful T&A authorization
events. To use this option, you must select the Use Relay checkbox in the T&A tab.
This option is only available for BioStation, BioLite Net, D-Station, X-Station,
BioStation T2, and FaceStation devices. For more information about configuring
T&A settings, see section 5.1.1.9, 5.1.3.9, 5.1.6.11, 5.1.7.10, and 5.1.8.11.
Disabled: Associated devices will not open the door, regardless of the attempted
authorization events.
Closed by: Select an option for closing the door.
Open period: The BioStar system will close the door after the period specified in
the Door Open Period (sec) field.
Open period+Status: The BioStar system will attempt to close the door based on
door status (if you have connected door sensors and the system can detect that the
door is open). If door sensors are not connected or the system is unable to detect
the door status, the system will close the door after the period specified in the Door
Open Period (sec) field. This setting is useful when used with revolving doors, for
Action
Program Sound: Activate and select a sound from the drop-down list to be
emitted by the BioStar program. Then, specify the duration (play count) of the
sound in seconds. If you set the Play Count to 0, the specified sound will play until
someone with administrative privileges manually stops the sound via the Realtime
Monitoring tab in the Monitoring pane. To add custom sounds to the list, see
section 3.10.1.2.
Device Sound: Activate and select a sound to be emitted by devices connected to
the door.
Send Email: Activate and setup emails to be sent by the system. For more
information about sending alert emails, see section 3.10.2.
Output Device: Activate and select a device to output an alarm signal.
Output Port: Select an output port to use when sending the alarm signal.
Output Signal: Select an output signal to send.
Action
Program Sound: Activate and select a sound from the drop-down list
to be emitted by the BioStar program. Then, specify the duration
(play count) of the sound in seconds. If you set the Play Count to 0,
the specified sound will play until someone with administrative
privileges manually stops the sound via the Realtime Monitoring tab in
the Monitoring pane. To add custom sounds to the list, see section
3.10.1.2.
Device Sound: Activate and select a sound to be emitted by devices
connected to the door.
Send Email: Activate and setup emails to be sent by the system. For
more information about sending alert emails, see section 3.10.2.
Output Device: activate and select a device to output an alarm signal.
Output Port: Select an output port to use when sending the alarm
signal.
Output Signal: Select an output signal to send.
Entrance Limit Zone Setting: Click the checkbox to enable an entrance limit
setting, and then specify the effective hours for the entrance limit.
Max Number of Entrance: Set the maximum number of entries allowed
during the specified time limit.
Timed APB (min): Specify a time limit for re-entry into a zone.
In case of Disconnected: Set how doors in the zone should behave if
communication is lost between the master and member devices.
Action
Program Sound: Activate and select a sound from the drop-down list
to be emitted by the BioStar program. Then, specify the duration
(play count) of the sound in seconds. If you set the Play Count to 0,
the specified sound will play until someone with administrative
privileges manually stops the sound via the Realtime Monitoring tab in
the Monitoring pane. To add custom sounds to the list, see section
3.10.1.2.
Device Sound: Activate and select a sound to be emitted by devices
connected to the door.
Send Email: Activate and setup emails to be sent by the system. For
more information about sending alert emails, see section 3.10.2.
Output Device: Activate and select a device to output an alarm signal.
Output Port: Select an output port to use when sending the alarm
signal.
Output Signal: Select an output signal to send.
Delay (sec)
Arm: Set the length of time (in seconds) to delay before arming the
zone.
Disarm: Set the length of time (in seconds) to delay before disarming
the zone.
Arm/Disarm Type: Specify settings for arming or disarming zones. For more
information for configuring arm and disarm settings, see 3.5.2.5. For more
information on setting up alarms, see section 3.10.
External Input/Out: Specify settings for enabling the BioStar system to
antomatically arming or disarming zones. For more information on
configuring external input/output settings, see 3.5.2.6. For more
information on setting up alarms, see section 3.10.
Action
Program Sound: Activate and select a sound from the drop-down list
to be emitted by the BioStar program. Then, specify the duration
(play count) of the sound in seconds. If you set the Play Count to 0,
the specified sound will play until someone with administrative
privileges manually stops the sound via the Realtime Monitoring tab in
the Monitoring pane. To add custom sounds to the list, see section
3.10.1.2.
Device Sound: Activate and select a sound to be emitted by devices
connected to the door.
Send Email: Activate and setup emails to be sent by the system. For
more information about sending alert emails, see section 3.10.2.
Output Device: Activate and select a device to output an alarm signal.
Output Port: Select an output port to use when sending the alarm
signal.
Output Signal: Select an output signal to send.
Action
Program Sound: Activate and select a sound from the drop-down list
to be emitted by the BioStar program. Then, specify the duration
(play count) of the sound in seconds. If you set the Play Count to 0,
the specified sound will play until someone with administrative
privileges manually stops the sound via the Realtime Monitoring tab in
the Monitoring pane. To add custom sounds to the list, see section
3.10.1.2.
Device Sound: Activate and select a sound to be emitted by devices
connected to the door.
Send Email: Activate and setup emails to be sent by the system. For
more information about sending alert emails, see section 3.10.2.
Output Device: Activate and select a device to output an alarm signal.
Output Port: Select an output port to use when sending the alarm
signal.
Output Signal: Select an output signal to send.
Muster Zone Type: By default, set to Manual. You can check for the people
who were present in a specified area for a specific time period. Please see
4.1.1 to see how to manually check attedance of people.
Tracking Time (hour): Specify how far (in hours) people are monitored for
their in/out activities in the zone. For example, if you set this value to 8, you
can track a record of attendace since 8 hours ago.
Door 1: Click the ellipsis () button to select door 1 of the interlock area.
Doors without associated devices cannot be added to the interlock zone.
Door 2: Click the ellipsis () button to select the device on door 2 of the
interlock area. Doors without associated devices cannot be added to the
interlock zone.
Card Type: Select a type of access card to issue (Mifare CSN, Mifare Template, EM 4100,
HID Prox, iCLASS CSN, or iCLASS Template).
Card ID: Displays the card ID number when a card is issued.
Custom ID: Enter a custom ID for the card.
Technical Support
If you have any questions regarding this document or BioStar software, please contact technical
support at [email protected].
Please provide the following information for prompt and easy assistance:
Version of BioStar and device model name (e.g. BioStar 1.8, BioStation)
Glossary
access card: A card that can be used to grant or restrict access to a specific area. BioStar supports
MIFARE, EM4100, HID proximity, iCLASS, and FeliCa cards. See also: proximity card.
access control system: A system of physical mechanisms and controls that permit or deny access to a
particular resource or physical area. BioStar is an IP-based biometric access control system.
alarm zone: A grouping of devices that is used to protect a physical area. BioStar monitors input
points in an alarm zone and triggers alarms when intrusion or tampering is detected.
anti-passback: A security protocol that prevents a user from providing unauthorized entrance to
another user via an access card or fingerprint. See also: timed anti-passback.
biometrics: Biometrics refers to the use of physical characteristics for verification or authorization.
BioStar incorporates Supremas award-winning fingerprint recognition technology to provide biometric
authentication of a user's identity and authorization to gain access to restricted areas.
bypass group: A group of users that can bypass normal restrictions for a zone.
client: BioStar client software allows an operator to connect remotely to the BioStar server and control
connected devices. An operator ID and password are required to access the system via a client.
department: A division of an organization used to group employees. The use of departments is not
necessary, but may be helpful to organize large numbers of employees.
device: In this guide, the word "device" refers to any Suprema product supported by the BioStar
system. Supported devices include BioStation, BioStation Mifare, BioStation HID, DStation, BioEntry
Plus/BioEntry W, BioEntry Plus Mifare/BioEntry W Mifare, BioEntry Plus iCLASS, BioEntry Plus HID,
BioLite Net, Xpass, and BioMini USB terminals, as well as the Secure I/O device.
distributed intelligence: In the BioStar system, the authorization database is distributed to each
terminal, so that authorization is faster and can continue even when other parts of the system are
offline.
door: Doors are the physical barriers that provide entry into a building or space. At least one device
must be connected to a door to provide access control, but two devices can be connected to support
anti-passback and other features, such as door relays, alarm relays, exit switches, and sensors.
duress finger: This term refers to an enrolled fingerprint that will activate silent alerts when a
candidate is under duress. In the typical duress scenario, a perpetrator forces the candidate to gain
access by force or threat of harm. The candidate gains access by means of his or her "duress finger,"
which allows access and simultaneously triggers the alarm or alert actions you specify.
enrollment: The process of creating a user account and capturing images of fingerprints or issuing
access cards.
entrance limit: The maximum number of times a user can gain authorization to a specific area. The
entrance limit can be related to a time period so that users are limited to certain number of entries
during office hours, for example.
ESSID: Extended Service Set ID. The ESSID is the name of a wireless network access point. It allows one
wireless network to be clearly distinguishable from another. ESSID is one type of SSID (the other being
BSSID).
face recognition -The automated process of validating a claimed identity based on the image of a
face. BioStar extracts and analyzes the facial features such as the skin texture and the shapes of the
face, eyes, nose and mouth from a captured face image and compares them with those of all the
registered persons.
false acceptance rate: The false acceptance rate (FAR) is a measure of the likelihood that a biometric
security system will incorrectly accept an access attempt by an unauthorized user. A system's FAR
typically is stated as the ratio of the number of false acceptances to the number of identification
attempts.
false rejection rate: The false rejection rate (FRR) is a measure of the likelihood that a biometric
security system will incorrectly reject an access attempt by an authorized user. A system's FRR is
typically stated as the ratio of the number of false rejections to the number of identification attempts.
fingerprint recognition -The automated process of matching two human fingerprints: one previously
recorded and one being provided by a user for authentication. BioStar incorporates Suprema's award-
winning algorithms for recognizing fingerprints.
fingerprint sensor: A fingerprint sensor is an electronic device used to capture a digital image of the
fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to
create a biometric template (a collection of extracted features) which is stored and used for fingerprint
recognition.
fire alarm zone: A zone that is used to interface with fire alarms and control doors when a fire is
detected.
host: A host is the device that serves as the master in a RS485 network. The host device relays data
packets between external devices (or a larger network) and slave devices connected to the RS485
network.
input signal: The signal sent to a device by an external object, such as an exit button.
operator: Operators are personnel who have rights to use BioStar clients. BioStar includes three pre-
defined classes for operators: administrators, operators, and managers. BioStar also supports a
maximum of 16 custom operator classes.
output signal: The signal sent to an external device, such as an alarm siren or electronic door strike.
proximity card: Proximity cards (or "prox" cards) are contactless integrated circuit devices used for
security access. BioStation, BioEntry Plus, and BioLite Net devices support EM4100 cards; BioStation
Mifare, BioEntry Plus Mifare, BioEntry W Mifare and BioLite Net, and DStation devices support MIFARE
and iCLASS cards; and BioStation HID and BioEntry Plus HID devices support HID proximity cards.
RF device: Short-range radio frequency devices used to gain access to doors. The BioStar system
allows 3rd party RF devices to be added to the system to incorporate existing hardware into the access
control configuration
time and attendance (T&A): This designation refers to the processes and functions that monitor and
report check-in and check-out activities by employees and allow administrators to define time slots
and schedules. The information collected by the BioStar system can be used in conjunction with
external systems for time reporting and payroll capabilities.
timed anti-passback: A security protocol that prevents reauthorization of a user for a specified period
of time. See also: anti-passback.
timezone: A customizable schedule that can be used to allow or restrict access during specified hours.
Timezones can combined with doors to create access groups.
user: A user is any person who has access rights. A user's access rights are comprised of individual
rights (user level), membership in access groups, and time restrictions.
Wiegand interface: The Wiegand interface is a wiring standard used to connect a card swipe
mechanism to the rest of an electronic entry system. The interface uses three wires, one of which is a
common ground and two of which are data transmission wires usually called DATA0 and DATA1, but
sometimes also labeled Data High and Data Low.
zone: A zone consists of two or more devices that are grouped together. BioStar includes seven types
of zone classifications.
A
anti-passback zone
access cards Access Group tab, 236
issuing, 72 Alarm tab, 236
Details tab, 234
Access Control tab
B
BioEntry Plus, 147
BioEntry W, 147 BioEntry Plus
BioLite Net, 157 configuring, 40
BioStation, 136 overview, 11
BioStation T2, 209
BioEntry W
D-Station, 186
overview, 11
FaceStation, 223
Xpass, 166 BioLite Net
Xpass Slim, 175 configuring, 43
X-Station, 201 V
Xpass zones
configuring, 44 adding, 61
overview, 11 adding devices, 61
bypassing restrictions, 66
Xpass Slim
configuring alarm actions, 63
overview, 11
configuring arm and disarm settings, 63
X-Station configuring external input/output settings,
configuring, 47 64
overview, 11 configuring inputs, 62
Z types, 60
viewing events, 66